Earlier in this chapter, we focused on using the Metasploit Framework to exploit a vulnerability on a target system and take control of it. With MSFvenom, instead of relying on a vulnerability in the system, you are aiming to exploit the most common security issue in all organizations: users. This is a vulnerability that can never be fully patched.
MSFvenom is essentially used to build shellcode. Shellcode can be defined as code that, when it is run, creates a reverse remote shell back to the attacker.
Shellcode can be used by inserting it into a file and then sending that file off to your target. This can be done using a phishing campaign, as we learned in Chapter 4, Mastering Social Engineering. Once the file is run, you can obtain remote access to the target's computer. Real-world attackers leverage this technique too. Shellcode is not only limited...