Working with msfvenom
We have read about mefencode
and msfpayload
in Chapter 4, Client-side Exploitation and Antivirus Bypass. Let us take a small recap. msfpayload
is used to generate binary from the payload, whereas msfencode
is used for encoding the binary using different encoding techniques. Here we will discuss another Metasploit tool which is a combination of both. This tool can play an important role in generating exploits that can execute stealthily.
Getting ready
To start our experiment with msfvenom
, launch the terminal window and pass on the msfvenom –h
command.
How to do it...
Let us take a look at various available options:
root@bt:~# msfvenom -h Usage: /opt/framework/msf3/msfvenom [options] Options: -p, --payload [payload] Payload to use. Specify a '-' or stdin to use custom.. -l, --list [module_type] List a module type example: payloads, encoders, nops, all -n, --nopsled [length] Prepend a nopsled of [length] size on to the payload ...