π₯ Introduction to MSFVenom
βοΈ Scenario: Gaining a Shell via FTP & Web Access
π§© Setup
We discover:
π Anonymous FTP login is allowed
π FTP root is exposed via a web service on port 80
βοΈ Web service runs Microsoft IIS
π IIS can execute
.aspx
files β we can upload a reverse shell
π Scanning the Target
Open Ports:
π Logging in via FTP
ποΈ Example Directory Listing:
β Indicates the ability to upload ASP.NET payloads
π οΈ Generating Payload with MSFVenom
π Output:
Payload size:
341 bytes
Final file size:
2819 bytes
Format:
ASPX
Architecture:
x86
π‘ Deploying the Payload
Upload reverse_shell.aspx
to the FTP server and navigate to:
β οΈ It will appear blankβbut the payload executes silently in the background.
π Setting Up the Listener
β Wait for the incoming connection...
π Gaining Meterpreter Access
π Success! You've gained a reverse Meterpreter shell.
β οΈ Session Dies Quickly?
Consider encoding the payload:
π§ͺ Privilege Escalation with Local Exploit Suggester
π Search & Use the Module
π§ Based on system info and user, the module recommends multiple exploits.
Example findings:
bypassuac_eventvwr
ms10_015_kitrap0d
ms13_081_track_popup_menu
π Using an Exploit: KiTrap0D
π₯οΈ The exploit launches notepad, injects the payload, and spawns a new privileged shell.
β You now have SYSTEM-level access!
π Additional Resources
π Metasploit: The Penetration Testerβs Guide β No Starch Press
Let me know if you want this exported into a .md
file or need another section covered!
Last updated