Melissa M.

asked • 05/02/23

How do I do this step by step?

For this module, we will be making our own shellcode that would make a call back to our machine. This will require critical thinking and will be not be explicitly explained on how to accomplish this task. You can use msfvenom, which has more detail found at: https://www.offensive-security.com/metasploit-unleashed/msfvenom/

Generate 2 payloads that will connect back to your attacking box (https://github.com/frizb/MSF-Venom-Cheatsheet)


1 Expert Answer

By:

Still looking for help? Get the right answer, fast.

Ask a question for free

Get a free answer to a quick problem.
Most questions answered within 4 hours.

OR

Find an Online Tutor Now

Choose an expert and meet online. No packages or subscriptions, pay only for the time you need.