reverse_shell_with_metaexploit
Differences
This shows you the differences between two versions of the page.
| Both sides previous revisionPrevious revisionNext revision | Previous revision | ||
| reverse_shell_with_metaexploit [2018/06/13 21:13] – jorpilo | reverse_shell_with_metaexploit [2018/08/30 04:07] (current) – jorpilo | ||
|---|---|---|---|
| Line 1: | Line 1: | ||
| ====== Reverse shell with metaexploit ====== | ====== Reverse shell with metaexploit ====== | ||
| + | Jorge Pinilla López | ||
| + | |||
| + | 2018/06/13 | ||
| + | |||
| Vamos a crear un reverse shell y a usarlo mediante un payload, metaexploit y meterpreter | Vamos a crear un reverse shell y a usarlo mediante un payload, metaexploit y meterpreter | ||
| Line 6: | Line 10: | ||
| Opciones por defecto: | Opciones por defecto: | ||
| - | *Port 443 | + | |
| - | *MSF | + | *MSF |
| - | *REVERSE | + | *REVERSE |
| - | *STAGELESS | + | *STAGELESS |
| - | *TCP | + | *TCP |
| Ejemplo de uso: | Ejemplo de uso: | ||
| < | < | ||
| Line 39: | Line 43: | ||
| Posibles payloads a generar: | Posibles payloads a generar: | ||
| + | *APK | ||
| + | *ASP | ||
| + | *ASPX | ||
| + | *Bash [.sh] | ||
| + | *Java [.jsp] | ||
| + | *Linux [.elf] | ||
| + | *OSX [.macho] | ||
| + | *Perl [.pl] | ||
| + | *PHP | ||
| + | *Powershell [.ps1] | ||
| + | *Python [.py] | ||
| + | *Tomcat [.war] | ||
| + | *Windows [.exe /.dll] | ||
| Esto genera dos archivos: | Esto genera dos archivos: | ||
| - | *linux-shell-staged-reverse-tcp-443.elf | + | |
| Archivo que el atacado debe ejecutar | Archivo que el atacado debe ejecutar | ||
| - | *linux-shell-staged-reverse-tcp-443-elf.rc | + | |
| Payload para multi/ | Payload para multi/ | ||
reverse_shell_with_metaexploit.1528924433.txt.gz · Last modified: by jorpilo
