reverse_shell_with_metaexploit
Differences
This shows you the differences between two versions of the page.
| Both sides previous revisionPrevious revisionNext revision | Previous revision | ||
| reverse_shell_with_metaexploit [2018/06/13 21:15] – jorpilo | reverse_shell_with_metaexploit [2018/08/30 04:07] (current) – jorpilo | ||
|---|---|---|---|
| Line 1: | Line 1: | ||
| ====== Reverse shell with metaexploit ====== | ====== Reverse shell with metaexploit ====== | ||
| + | Jorge Pinilla López | ||
| + | |||
| + | 2018/06/13 | ||
| + | |||
| Vamos a crear un reverse shell y a usarlo mediante un payload, metaexploit y meterpreter | Vamos a crear un reverse shell y a usarlo mediante un payload, metaexploit y meterpreter | ||
| Line 6: | Line 10: | ||
| Opciones por defecto: | Opciones por defecto: | ||
| - | *Port 443 | + | |
| - | *MSF | + | *MSF |
| - | *REVERSE | + | *REVERSE |
| - | *STAGELESS | + | *STAGELESS |
| - | *TCP | + | *TCP |
| Ejemplo de uso: | Ejemplo de uso: | ||
| < | < | ||
| Line 39: | Line 43: | ||
| Posibles payloads a generar: | Posibles payloads a generar: | ||
| - | | + | *APK |
| - | + ASP | + | *ASP |
| - | + ASPX | + | *ASPX |
| - | + Bash [.sh] | + | *Bash [.sh] |
| - | + Java [.jsp] | + | *Java [.jsp] |
| - | + Linux [.elf] | + | *Linux [.elf] |
| - | + OSX [.macho] | + | *OSX [.macho] |
| - | + Perl [.pl] | + | *Perl [.pl] |
| - | + PHP | + | *PHP |
| - | + Powershell [.ps1] | + | *Powershell [.ps1] |
| - | + Python [.py] | + | *Python [.py] |
| - | + Tomcat [.war] | + | *Tomcat [.war] |
| - | + Windows [.exe // .dll] | + | *Windows [.exe /.dll] |
| Esto genera dos archivos: | Esto genera dos archivos: | ||
| - | *linux-shell-staged-reverse-tcp-443.elf | + | |
| Archivo que el atacado debe ejecutar | Archivo que el atacado debe ejecutar | ||
| - | *linux-shell-staged-reverse-tcp-443-elf.rc | + | |
| Payload para multi/ | Payload para multi/ | ||
reverse_shell_with_metaexploit.1528924531.txt.gz · Last modified: by jorpilo
