and welcome to another episode of breaking stuff with Robert.
Today we're going over M S F P C, which is short for the menace plate framework Venom Payload Creator. This is a rapper that helps you to generate different types of payload based on your selections and inputs, and it essentially makes the process of creating a payload
a little bit easier. But for those of you with experience in doing penetration, testing
on those types of things using medicine, flight, you know that that payload generator is actually really, really, really great for doing. Very specific things are adding, you know, Cem encoding or changes to a payload, or
really, the sky's the limit. But this is kind of a simple version of that that allows you to quickly generate something for testing purposes.
target audiences here are exploitation analysts looking to recreate attacks or demonstrate knowledge packs cyber defense analysts looking to create signatures for attacks using interpreter or other payloads and penetration testers looking too quickly generate payloads for use against target systems.
Some pretty requisites here. It would be good to know about menace point and how it's used in some basic syntax. There
a fundamental knowledge of shell types while not required for this video, we will talk about, like, reverse shell or buying shell. And so it's good to understand what that means with respect to getting a connection to a system
knowledge of payload delivery methods. So we're just gonna use a basic Web server here in the demo, but understanding how payloads work, how they connect back to systems, things of that nature is gonna be critical to helping you to understand this tool and why it's, you know, great for quick use and then fundamental knowledge of the county Lennox command line A utilization.
So with those things in mind, let's go ahead and jump into our demo.
All right, everybody, welcome to the handy dandy lamb environment today is we promised. We're talking about the men exploit framework Payload
creator. So in short, M S F p. C. Is used to help us kind of streamlined the process of creating payloads. Now,
I said medicine point framework, uh, menace plate from work payload creator, but really uses MSF venom to help us put this together and make this kind of an easy process. If you've ever used MSF venom or had to kind of lay out the long string of
information to generate a payload. It's not really much more than this, but we're going to kind of go above and beyond using some of these
additional pieces. Chairman, you could just generate in a basic query here, MSF PCU could do windows and the I P address, and then that would generate a windows based payload for you. But we're going to kind of add some additional things to this to make it a little bit more targeted. So
let's go ahead and do MSF PC Over here. We've got the I p. Address of our attacking machines that will do that. I pee. Sorry, we gotta do windows first cause we're gonna attack windows based machines windows
and then the I pee wee want to connect back to
and could be any pork. I used 1234 All the time we're doing a reverse payload
or a connection type. You could do reverse our bond. And so buying, meaning it binds to the other system and you connect reverse meaning it connects back. So we want to connect that we're gonna do a stage. This payload, which means when you run it, it runs and then TCP
so it goes through the process here, it looks like, Yeah, I had one from the other time that was already there. So it just went ahead and overwrote it. No big deal. So with that in mind, we're gonna go ahead and start this quick web server here
and that Lina commands
and that will serve up content. That's in the directory. Where? The payload. Now,
I'm gonna open up this, uh,
So we navigate to the attacking machine. Now, in this case, we're imagining that maybe we've tricked a user
into clicking on something. Maybe we're on the machine, but we don't have additional tools, whatever the case may be. And so we connect happened, some trouble navigating. We connect here.
And this just gives us a directory that it's serving upon the Kelly system. There's r E X e.
And once we download that,
Oh, look at that. So our antivirus con, it's good for the antivirus, but we're gonna stop it from doing that this time, so Let's turn the antivirus office you can see there. I mean, this doesn't generate like, a payload that's encrypted or doesn't change the checks. Um, so you've got,
and a virus on a system Or, you know, if you haven't altered the check, some of the
payload, then of course, it'll block it. So let's go ahead.
I'm just turning off the protections.
Now let's see if it sings a different tune.
Oh, we're keeping it
So it looks like it. Got it?
it's given me this warning to not run it. But before I run it, there's one thing we have to do here. So this won't just connect back.
We actually have to start a listener or something that will accept the connection.
So we have to bring up the men, exploit framework,
and then we're gonna just use
And when I set the payload
two windows, my interpreter, you should finish with tab here sometimes,
and then we're doing a reverse TCP connection
so you can check the options
that it needs. So we'll set the local host
We'll set the local port to that 1234 ports
that we cut in the payload.
They and that starts now,
And there you go. We've got a connection.
there's a few other things that we would probably have to do in this process. If we were, you know, against the machine that had up to date anniversary, we would likely need to run this through some type of Mafia skater before sending it to the other side or try and maybe some different Codex to run this through. We're just tryingto
to make it so that the universe doesn't pick it up. But again, for the sake of this demonstration, we kind of showed you how you could use
um, you know, this payload generator
to create those four either man exploit. Or you could even set up a listener without using my comm interpreter type connection there. But with that in mind, let's go ahead and jump actually slides.
Well, I hope you enjoyed that demonstration of M S, F. P C and some of the ways that you can use that. And hopefully that use case provides you with some you know, thoughts on what you could do with a tool on how it could benefit you in your testing or security needs.
So with those things in mind, I want to thank you for your time today and I look forward to seeing you again here.