
Zach K. answered 12/18/23
Senior Linux Systems Administrator
Which part specifically are you struggling with - running the listener to catch the reverse shellcode or configuring the payload with msfvenom for its single or multostaged payload?
Melissa M.
asked 05/02/23For this module, we will be making our own shellcode that would make a call back to our machine. This will require critical thinking and will be not be explicitly explained on how to accomplish this task. You can use msfvenom, which has more detail found at: https://www.offensive-security.com/metasploit-unleashed/msfvenom/
Generate 2 payloads that will connect back to your attacking box (https://github.com/frizb/MSF-Venom-Cheatsheet)
Zach K. answered 12/18/23
Senior Linux Systems Administrator
Which part specifically are you struggling with - running the listener to catch the reverse shellcode or configuring the payload with msfvenom for its single or multostaged payload?
Get a free answer to a quick problem.
Most questions answered within 4 hours.
Choose an expert and meet online. No packages or subscriptions, pay only for the time you need.