Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Filter payloads by platform and arch for msfvenom #13029

Merged
merged 2 commits into from Mar 5, 2020

Conversation

@wvu-r7
Copy link
Member

wvu-r7 commented Mar 5, 2020

Expected behavior when specifying platform or arch while listing payloads:

wvu@kharak:/rapid7/metasploit-framework:feature/msfvenom$ ./msfvenom -l payloads -a x64 --platform linux

Framework Payloads (559 total) [--payload <value>]
==================================================

    Name                                  Description
    ----                                  -----------
    generic/custom                        Use custom string or file as payload. Set either PAYLOADFILE or PAYLOADSTR.
    generic/shell_bind_tcp                Listen for a connection and spawn a command shell
    generic/shell_reverse_tcp             Connect back to attacker and spawn a command shell
    linux/x64/exec                        Execute an arbitrary command
    linux/x64/meterpreter/bind_tcp        Inject the mettle server payload (staged). Listen for a connection
    linux/x64/meterpreter/reverse_tcp     Inject the mettle server payload (staged). Connect back to the attacker
    linux/x64/meterpreter_reverse_http    Run the Meterpreter / Mettle server payload (stageless)
    linux/x64/meterpreter_reverse_https   Run the Meterpreter / Mettle server payload (stageless)
    linux/x64/meterpreter_reverse_tcp     Run the Meterpreter / Mettle server payload (stageless)
    linux/x64/pingback_bind_tcp           Accept a connection from attacker and report UUID (Linux x64)
    linux/x64/pingback_reverse_tcp        Connect back to attacker and report UUID (Linux x64)
    linux/x64/shell/bind_tcp              Spawn a command shell (staged). Listen for a connection
    linux/x64/shell/reverse_tcp           Spawn a command shell (staged). Connect back to the attacker
    linux/x64/shell_bind_ipv6_tcp         Listen for an IPv6 connection and spawn a command shell
    linux/x64/shell_bind_tcp              Listen for a connection and spawn a command shell
    linux/x64/shell_bind_tcp_random_port  Listen for a connection in a random port and spawn a command shell. Use nmap to discover the open port: 'nmap -sS target -p-'.
    linux/x64/shell_find_port             Spawn a shell on an established connection
    linux/x64/shell_reverse_ipv6_tcp      Connect back to attacker and spawn a command shell over IPv6
    linux/x64/shell_reverse_tcp           Connect back to attacker and spawn a command shell

wvu@kharak:/rapid7/metasploit-framework:feature/msfvenom$

Fixes #12250.

@bwatters-r7 bwatters-r7 self-assigned this Mar 5, 2020
@bwatters-r7 bwatters-r7 merged commit acc7dd1 into rapid7:master Mar 5, 2020
3 checks passed
3 checks passed
Metasploit Automation - Sanity Test Execution Successfully completed all tests.
Details
Metasploit Automation - Test Execution Successfully completed all tests.
Details
continuous-integration/travis-ci/pr The Travis CI build passed
Details
@bwatters-r7

This comment has been minimized.

Copy link
Contributor

bwatters-r7 commented Mar 5, 2020

Release Notes

This adds filtering to the msfvenom list option to filter by platform and arch.

@wvu-r7 wvu-r7 deleted the wvu-r7:feature/msfvenom branch Mar 5, 2020
@tperry-r7 tperry-r7 added the rn-fix label Mar 16, 2020
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Linked issues

Successfully merging this pull request may close these issues.

3 participants
You can’t perform that action at this time.