工具介紹 Shellsploit,ShellCode生成器
Shellsploit讓您為各種操作系統生成自定義的shellcode,後門,注入器。讓我們通過編碼器對每個位元組進行混淆。
github: https://github.com/vasco2016/shellsploit-framework
依賴安裝
root$ sudo pip install capstoneroot$ sudo pip install readline(Not necessary for windows coz preinstalled in shellsploit)root$ sudo pip install pefile
root$ sudo pip install coloramaroot$ sudo pip install pylzma安裝Pip在windows/linux機器上都沒有問題安裝命令如下:root$ python setup.py –s/ –-setup installroot$ chmod +x shellsploit (if you are using windows just pass this step)root$ ./shellsploit運行一下看看刺激吧!還是跟msf相似!help一下看看命令!!!
咱們就隨便看一下注入模塊
刺激,咱們隨便看看!
跟msf是賊像的,,,一些功能自己可以看看!!主要是介紹一下!!!
參數說明:
usage: shellsploit [-l] [-p] [-o] [-n]
[--host] [--port]
optional arguments:
-l, --list Show list of backdoors,shellcodes,injectors
-p, --payload Set payload for usage
-n, -nc Declare netcat for usage
--host The connect/listen address
--port The connect/listen port
Inline arguments:
Main Menu:
help Help menu
os Command directly ur computer
use Select Module For Use
clear Clear the menu
show modules Show Modules of Current Database
show backdoors Show Backdoors of Current Database
show injectors Show Injectors(Shellcode,dll,so etc..)
Shellcode Menu:
back Exit Current Module
set Set Value Of Options To Modules
ip Get IP address(Requires net connection)
os Command directly ur computer
clear Clear the menu
disas Disassembly the shellcode(Support : x86/x64)
whatisthis Learn which kind of shellcode it is
iteration Encoder iteration time
generate Generate shellcode
output Save option to shellcode(txt,py,c,cpp,exe)
show encoders List all obfucscation encoders
show options Show Current Options Of Selected Module
Injector Menu:
set Set Value Of Options To Modules
help Help menu
back Exit Current Module
os Command directly ur computer
pids Get PID list of computer
getpid Get specific PID on list(Ex. getpid Python)
好了就到這裡吧!!!
推薦閱讀:
※CVE-2018-6789 Exim Off-by-one漏洞分析
※快視頻首回應B站數據被盜:該事件系嚴重的造謠行為 360必須認清以下問題,否則自討苦吃
※Python3學習系列(二):編寫屬於自己的網站後台掃描器
※TK 教主:中國黑客VS外國黑客,我們為何不一樣?
※信息系統定級與備案工作介紹