当前位置:网站首页>Network security engineer Demo: the original * * is to get your computer administrator rights! [maintain]
Network security engineer Demo: the original * * is to get your computer administrator rights! [maintain]
2020-11-06 01:35:00 【Kali and programming】
Before class statement :
1、 This sharing is only for learning exchange , Please abide by the laws and regulations consciously !
2、 Search for :Kali And programming , Learn more about the Internet *** dried food !
3、Kali And programming is updated on time every day , Please study and pay attention to !
Body part
One 、 Background introduction
Metasploit It's a vulnerability framework . Its full name is The Metasploit Framework, It's called MSF.Metasploit As the most popular tool in the world , Not just because it's convenient and powerful , What's more, its framework . It allows users to develop their own vulnerability scripts , To test .Metasploit(msf) How powerful it is ? How to use it *** Controlling the victim's mainframe ? Now let's learn !
Two 、 Resources and equipment
1. It's a success Win7 One virtual machine
2. Xiaobai, who is ready to go .
3. Installed Kali Linux One virtual machine .
3、 ... and 、 Strategic arrangements
3.1 Yes, it's taken down Windows After the host enters *** Stage , The specific operation is shown in the figure below .
step 1: Run the exploit module , As shown in the figure below .
command :run
step 2: Get into Windows The host cmd window , As shown in the figure below .
step 3: Use the command to view the system information of the victim host , Know yourself and know your enemy, and have a more comprehensive grasp of the target victim host , More comprehensive control of the target host , Get more comprehensive information , As shown in the figure below .
command :systeminfo
step 4: The system information of the victim host is shown in the figure below .
3.2 User management operation on the victim host , As shown in the figure below .
step 1: Add hidden user information to the victim host , As shown in the figure below .
command :net user A new user name $ User password /add
Example :net user admin$ 12456 /add
step 2: Check out the new users you just added , As shown in the figure below .
command :net user( Because the new user is a hidden user , So the command line can't see the user )
step 3: Add new users that are not hidden , As shown in the figure below .
command :net user A new user name User password /add
Example :net user admin 12456 /add
step 4: Check out the new users you just added , As shown in the figure below .
command :net user
step 5: Use the graphical interface in the victim host to view the newly created user , You can see the new hidden user in this interface ( If you need to achieve the real sense of hidden users, you need to change the registry , Please keep an eye on the follow-up of this issue )
step 6: Delete user , As shown in the figure below .
command :net user user name /del
Example :net user admin /del
step 7: Add the new user to the administrators group , As shown in the figure below .
command :net localgroup administrators /add
step 8: View the users of the administrators group , As shown in the figure below .
command :net localgroup administrators
3.3 File operation on the victim host , As shown in the figure below .
step 1: New folder
command :md file name
Example :md abc
step 2: Delete folder
command :rd file name
Example :rd abc
step 3: New text file , As shown in the figure below .
command :echo Text file content > file name
Example :echo hi you are hacked > hk.txt
3.4 Check the host name of the victim host , As shown in the figure below .
command :hostname
Small make up a word knock creation , It's hard work , Can you pay attention to me ? You can also search for :Kali And programming , Learn more ****** How about the technique ! Rejection of piracy , Please state the source of the reprint :Kali And programming
Point me to learn more Kali Linux*** Testing and networking *** Practical skills ! Please add a link description
版权声明
本文为[Kali and programming]所创,转载请带上原文链接,感谢
边栏推荐
- Five vuex plug-ins for your next vuejs project
- 零基础打造一款属于自己的网页搜索引擎
- Recommendation system based on deep learning
- 5.4 static resource mapping
- 一篇文章带你了解CSS3 背景知识
- Construction of encoder decoder model with keras LSTM
- Python Jieba segmentation (stuttering segmentation), extracting words, loading words, modifying word frequency, defining thesaurus
- Installing ns-3 on ubuntu18.04
- use Asponse.Words Working with word templates
- Python基础数据类型——tuple浅析
猜你喜欢
一篇文章带你了解CSS3圆角知识
If PPT is drawn like this, can the defense of work report be passed?
Elasticsearch数据库 | Elasticsearch-7.5.0应用搭建实战
Discussion on the technical scheme of text de duplication (1)
Arrangement of basic knowledge points
比特币一度突破14000美元,即将面临美国大选考验
一篇文章带你了解CSS对齐方式
DRF JWT authentication module and self customization
2019年的一个小目标,成为csdn的博客专家,纪念一下
Brief introduction and advantages and disadvantages of deepwalk model
随机推荐
MeterSphere开发者手册
理解格式化原理
前端基础牢记的一些操作-Github仓库管理
这个项目可以让你在几分钟快速了解某个编程语言
Named entity recognition in natural language processing: tanford core LP ner (1)
比特币一度突破14000美元,即将面临美国大选考验
ES6学习笔记(五):轻松了解ES6的内置扩展对象
Classical dynamic programming: complete knapsack problem
With the advent of tensorflow 2.0, can pytoch still shake the status of big brother?
Analysis of react high order components
Wechat applet: prevent multiple click jump (function throttling)
Installing the consult cluster
A brief history of neural networks
Python filtering sensitive word records
Do not understand UML class diagram? Take a look at this edition of rural love class diagram, a learn!
百万年薪,国内工作6年的前辈想和你分享这四点
How to demote domain controllers and later in Windows Server 2012
Interpretation of Cocos creator source code: engine start and main loop
Multi classification of unbalanced text using AWS sagemaker blazingtext
TensorFlow中的Tensor是什么?