CVE-2018-4878 Exploit生成器

RedFree | Metasploit, ShellCode, Windows | 2018-02-23
CVE-2018-4878 Exploit生成器
Git地址:https://github.com/anbai-inc/CVE-2018-4878样本来源:https://github.com/brianwrf/CVE-2017-4878-Samples分析报告:http://blog.talosintelligence.com/2018/02/group-123-goes-wild.htmlPython生成Exploit代码(Windows弹计算器):#!/usr/bin/env python # coding: UTF-8 buf =  "" buf&nb... [阅读全文]
ė8,349 次访问 6没有评论 0,

使用C#或MASM执行shellcode

RedFree | C#, CobaltStrike, Metasploit, ShellCode | 2017-01-11
1、C#执行shellcode的代码如下(需要在项目属性>生成中指定目标平台为x86编译的程序才可正常运行)[shellcode为弹出计算器]:using System; using System.Collections.Generic; using System.Runtime.InteropServices; namespace Shellcode {     class Program     { &nb... [阅读全文]
ė250 次访问 6没有评论 0, ,

Metasploit生成各种类型Payload的命令(msfvenom)

RedFree | CobaltStrike, Metasploit, ShellCode | 2016-12-06
Metasploit生成各种类型Payload的命令(msfvenom)
      Often one of the most useful (and to the beginner underrated) abilities of Metasploit is the msfpayload module. Multiple payloads can be created with this module and it helps something that can give you a shell in almost any situation. For each of these payloads you can go into msfconsole and select explo... [阅读全文]
ė337 次访问 6没有评论 0, ,

使用shellcode打造MSF免杀payload

RedFree | CobaltStrike, Metasploit, ShellCode | 2015-08-23
使用shellcode打造MSF免杀payload
0x00 前言经常有同学提及MSF payload的免杀问题,其实除了Veil之处,还有另一种比较轻巧的方案可以打造免杀的payload,那就是shellcode。0x01 从哪里开始shellcode是什么,可以去drops搜索学习,但这并不是本文的重点。因为MSF已经为我们提供了shellcode的生成功能,接下来我们就拿最常用的payload:reverse_tcp来做测试吧!(其它的payload均可以)Cob... [阅读全文]
Ɣ回顶部