Windows Shells

Payload Types

  • DLLs

  • Batch

  • VBS

  • MSI

  • Powershell

Payload Generation

Resource

Description

MSFVenom & Metasploit-Framework

Sourcearrow-up-right MSF is an extremely versatile tool for any pentester's toolkit. It serves as a way to enumerate hosts, generate payloads, utilize public and custom exploits, and perform post-exploitation actions once on the host. Think of it as a swiss-army knife.

Payloads All The Things

Sourcearrow-up-right Here, you can find many different resources and cheat sheets for payload generation and general methodology.

Mythic C2 Framework

Sourcearrow-up-right The Mythic C2 framework is an alternative option to Metasploit as a Command and Control Framework and toolbox for unique payload generation.

Nishang

Sourcearrow-up-right Nishang is a framework collection of Offensive PowerShell implants and scripts. It includes many utilities that can be useful to any pentester.

Darkarmour

Sourcearrow-up-right Darkarmour is a tool to generate and utilize obfuscated binaries for use against Windows hosts.

Use CMD when:

  • You are on an older host that may not include PowerShell.

  • When you only require simple interactions/access to the host.

  • When you plan to use simple batch files, net commands, or MS-DOS native tools.

  • When you believe that execution policies may affect your ability to run scripts or other actions on the host.

Use PowerShell when:

  • You are planning to utilize cmdlets or other custom-built scripts.

  • When you wish to interact with .NET objects instead of text output.

  • When being stealthy is of lesser concern.

  • If you are planning to interact with cloud-based services and hosts.

  • If your scripts set and use Aliases.

Last updated