All right, So now what we need to dio is now we move the
the expo. I'm filed to this folder.
I'm also going to create
when I extract the package itself. So I need to run
the gash extra extract,
and I'm using tab complete there. So I just I know there's a file start with axe or just an excellent word. Hit the attack E.
And then I'm gonna go ahead and call this
I shall call it worked there. So it'll make that too confusing.
So you'll notice I have a work directory created here.
And if I look inside there, I've got the file structure that the package requires,
but I'm also gonna do is make a directory
underneath worked er,
and now I'm gonna copy the control and post install files
to this Debian subdirectory
All right, well, it helps if I spell if I had the actual file little mistake there.
So first we're gonna copy the control file,
then we're gonna copy
Now there's a booth in the proper place,
and we can go that director real quick
and I need to make coats the post installation file, Execute herbal. So I'm gonna do a change mode to that.
Now I can see that it's executed well. And of course, it changes color in my in my bass shell to show that that happened.
Now that I've got those things in place,
I can use the MSF venom
tool and this is part of medicine. Boy. It replaces the previous a mess of payload and, um,
other other commands that you could use from a command line to bundle together
information Thio created payload or could create a file without having to be in the medicinally console
or in the medicine a framework directly so I could just use it from the command line.
And so what I need to do I've got this in my command history. Some is gonna go ahead and find it.
COMESA of venom. There it is.
All right, so let's review this command real quick. It looks like it's got a lot of stuff, and it does
so Architecture er is X 64.
That's not 36 architecture,
and I tell them my platform is Lennox, and I'm now a specifying the payload
and the payload is a Lennox. 64 bit shall reverse TCP
a. Do you need to change my I p address?
So I'm gonna go ahead and
you hear that? And it was 26.1 29 I believe.
Open up a new town and don't check myself.
Yep. When I need you won 68 26 1 29
I'm also going to choose.
Specify that my little comport is 443
the victim connects to my website, it won't look like a suspicious connection at all. 443 is a normal port to see connected to websites.
I'm also specifying a by code
of hex 00 to exclude from this Pedro generation.
Ah, that's needed for
better compatibility with this particular architecture.
I'm also specifying the awkward format and which is elf
and then my own put file.
I know it's underneath route Backdoor worked there User games Expo. I'm scores. So this
payload becomes part of the package
and then again, with the victim, installs it than that
capability for the river shell should be activated.
So we'll go ahead and run the command.