Payloads - kaotickj/K-Sploit GitHub Wiki
Payloads
-
From the main menu, press
2
to load the Payloads Menu to quickly and easily craft metasploit payloads for a wide variety of targets (options for windows x86/x64, linux x86/x64, mac/osx, android, and python). -
Press
enter
to continue.
- Choose an option from the Payloads Menu :
- Windows Payloads - Choose Option 1 for Meterpreter payloads (exe) for Windows x86 and x64
- Linux Payloads - Choose Option 2 for Meterpreter payloads (elf) for Linux x86 and x64
- Mac/OSX Reverse TCP - Choose Option 3 for Meterpreter payload (macho) for Mac/OSX
- Android Meterpreter Reverse TCP - Choose Option 4 for Meterpreter payload (apk) for Android
- Unix Reverse Python - Choose Option 5 for Meterpreter payload (python) for systems running python
Windows Payloads
- From the Main Payloads Menu, press
1
to load the Windows Payloads Menu. - Press
enter
to continue.
You are presented with options:
- Windows x86 Meterpreter Reverse TCP - (Rarely Encountered) Choose Option 1 to craft a windows x86 (32 bit) meterpreter reverse tcp payload.
- Windows x64 Meterpreter Reverse TCP - (Most Modern Windows Systems) Choose Option 2 to craft a windows x64 (64 bit) meterpreter reverse tcp payload.
Windows x86 Meterpreter Reverse TCP Payload
- From the Windows Payloads Menu, choose option
1
to craft a windows x86 (32 bit) meterpreter reverse tcp payload. - Enter the attacker ip address (probably in the "current adapter addresses" displayed on your screen)
- Enter the target port on the attacker machine, i.e.:
4444
- The script will generate a shikata ga nai encoded windows/meterpreter/reverse_tcp payload and save it as "shell.exe" in the working directory
Use this payload with a Windows Meterpreter Reverse TCP listener
Windows x64 Meterpreter Reverse TCP Payload
- Choose option
2
to craft a windows x64 (64 bit) meterpreter reverse tcp payload. - Enter the attacker ip address (probably in the "current adapter addresses" displayed on your screen)
- Enter the target port on the attacker machine, i.e.:
4444
- The script will generate a xor encoded windows/x64/meterpreter/reverse_tcp payload and save it as "shell64.exe" in the working directory
Use this payload with a Windows Meterpreter Reverse TCP listener
Linux Payloads
- From the Main Payloads Menu, press
2
to load the Linux Payloads Menu. - Press
enter
to continue.
You are presented with options:
- Linux x86 Meterpreter Reverse TCP - Choose Option 1 to craft a linux x86 (32 bit) meterpreter reverse tcp payload.
- Linux x64 Meterpreter Reverse TCP - Choose Option 2 to craft a windows x64 (64 bit) meterpreter reverse tcp payload.
Linux x86 Meterpreter Reverse TCP Payload
- From the Linux Payloads Menu, choose option
1
to craft a linux x86 (32 bit) meterpreter reverse tcp payload. - Enter the attacker ip address (probably in the "current adapter addresses" displayed on your screen)
- Enter the target port on the attacker machine, i.e.:
4444
- The script will generate a raw linux/meterpreter/reverse_tcp payload and save it as "shell.elf" in the working directory
Use this payload with a Linux Meterpreter Reverse TCP listener
Linux x64 Meterpreter Reverse TCP Payload
- Choose option
2
to craft a linux x64 (64 bit) meterpreter reverse tcp payload. - Enter the attacker ip address (probably in the "current adapter addresses" displayed on your screen)
- Enter the target port on the attacker machine, i.e.:
4444
- The script will generate a raw linux/x64/meterpreter/reverse_tcp payload and save it as "shell64.elf" in the working directory
Use this payload with a Linux Meterpreter Reverse TCP listener
Mac-OSX Payload
- From the Main Payloads Menu, press
3
to load the Mac/OSX Payloads Options. - Enter the attacker ip address (probably in the "current adapter addresses" displayed on your screen)
- Enter the target port on the attacker machine, i.e.:
4444
- The script will generate a raw osx/x86/shell_reverse_tcp payload and save it as "shell.macho" in the working directory
Use this payload with a OSX Reverse TCP Listener
Android Payload
- From the Main Payloads Menu, press
4
to load the Android Payload Options. - Enter the attacker ip address (probably in the "current adapter addresses" displayed on your screen)
- Enter the target port on the attacker machine, i.e.:
4444
- The script will generate an android/meterpreter/reverse_tcp payload and save it as "shell.apk" in the working directory
Use this payload with an Android Meterpreter Reverse TCP Listener