πŸ’₯ Introduction to MSFVenom

βš™οΈ Scenario: Gaining a Shell via FTP & Web Access


🧩 Setup

We discover:

  • πŸ“‚ Anonymous FTP login is allowed

  • 🌐 FTP root is exposed via a web service on port 80

  • βš™οΈ Web service runs Microsoft IIS

  • πŸ”Ž IIS can execute .aspx files β†’ we can upload a reverse shell


πŸ”Ž Scanning the Target

$ nmap -sV -T4 -p- 10.10.10.5

Open Ports:

21/tcp open  ftp     Microsoft ftpd
80/tcp open  http    Microsoft IIS httpd 7.5

πŸ”“ Logging in via FTP

πŸ—‚οΈ Example Directory Listing:

βœ… Indicates the ability to upload ASP.NET payloads


πŸ› οΈ Generating Payload with MSFVenom

πŸ“Œ Output:

  • Payload size: 341 bytes

  • Final file size: 2819 bytes

  • Format: ASPX

  • Architecture: x86


πŸ“‘ Deploying the Payload

Upload reverse_shell.aspx to the FTP server and navigate to:

⚠️ It will appear blankβ€”but the payload executes silently in the background.


πŸ“ž Setting Up the Listener

βœ… Wait for the incoming connection...


🐚 Gaining Meterpreter Access

πŸŽ‰ Success! You've gained a reverse Meterpreter shell.


⚠️ Session Dies Quickly?

Consider encoding the payload:


πŸ§ͺ Privilege Escalation with Local Exploit Suggester


πŸ” Search & Use the Module

🧠 Based on system info and user, the module recommends multiple exploits.

Example findings:

  • bypassuac_eventvwr

  • ms10_015_kitrap0d

  • ms13_081_track_popup_menu


πŸ” Using an Exploit: KiTrap0D

πŸ–₯️ The exploit launches notepad, injects the payload, and spawns a new privileged shell.

βœ… You now have SYSTEM-level access!


πŸ“š Additional Resources


Let me know if you want this exported into a .md file or need another section covered!

Last updated