当前位置:网站首页>MSF practice - harm of ms17-010 vulnerability
MSF practice - harm of ms17-010 vulnerability
2022-06-09 09:49:00 【Always a teenager】
Today, let's continue to introduce the relevant knowledge of penetration testing , The main content of this paper is MSF Actual penetration test win7 host .
disclaimer :
The content introduced in this article is only for learning and communication , It is strictly prohibited to use the technology in the text for illegal acts , Otherwise, you will bear all serious consequences !
Again : It is forbidden to perform penetration tests on unauthorized equipment !
One 、MS17-010 Vulnerability profile
2017 year 4 month 14 Japan , Hacker groups Shadow Brokers Released a large number of cyber attack tools , Among them is “ Eternal Blue ” Tools , The tool leverages Windows Systematic SMB Loophole , Thus, you can obtain the highest permission of the system . That year 5 month 12 Japan , Other hackers take advantage of “ Eternal Blue ” Loophole , Made wannacry The blackmail virus , Many enterprises around the world 、 Colleges and universities have been recruited on the intranet .
Blue hole of eternity , stay MSF The corresponding in is the number MS17-010 Exploit module .
Two 、MSF Module selection and use
First , Let's choose MSF Module , Carry out orders :
search name:ms17-010
The results are shown below :
ad locum , We select the... In the above figure 0 A module , Carry out orders :
use exploit/windows/smb/ms17_010_eternalblue
After module selection , We carry out orders :
show options
You can view the parameters of the attack module , The results are shown below :
As can be seen from the above figure , At present, most of our attack parameters have been set , What we need to set ourselves up is RHOSTS, Carry out orders :
set RHOSTS 192.168.136.77
In the above order RHOSTS The parameter represents the target host , That is, the equipment to be tested for penetration , We set this parameter to one Windows7 Of Vmware virtual machine .
3、 ... and 、 Attack payload settings
Next , We also need to set the attack payload .
We can simply understand it as , The function of the previous module is to choose which way to attack the penetration system , And the attack payload (Payload) That is, what to do after the success of the infiltration system .
In the new version of MSF in , When we select this module , Will automatically help us configure the attack payload , As shown below :
Notice in the picture above , We used reverse_tcp Attack payload of , This attack payload after the attack is successful , It will feed back a message to the specified port of the specified device TCP link , And it allows us to execute SHELL command . Above Payload Medium LHOST and LPORT That is... Of the target device IP Address and port number , ad locum MSF Help us to LHOST Automatically set to the... Of this machine IP Address ,LPORT Auto set to 4444( An unusual port number ).
Four 、MSF Perform penetration and effect viewing
After completing the above configuration , We carry out orders :
run
Indicates that the module is executed , The execution result of this command is as follows :
Next , So let's test that out MSF Results of penetration tests , We are bouncing back SHELL in , Execute the command to test , The results are shown below :
You can see , We can carry out windows Operation command of .
after , We carry out orders :
screenstot
This command allows us to get the current screen status , And save it as a picture , The execution result of this command is as follows :
It can be seen from the figure above , The screenshot of the target host is saved in /root/ Next , We open the picture , The results are shown below :
above , It fully explains MS17-010 The harm of loopholes !
Originality is not easy. , Reprint please explain the source :https://blog.csdn.net/weixin_40228200
边栏推荐
- 关于电脑网络浏览器没有网络,但是QQ和微信可以登录,解决浏览器网络问题
- DNMAP架构实现和扫描实战
- LeetCode_二叉树_前缀和_中等_437. 路径总和 III
- JWT and session
- Android common principle interview questions (preliminary sorting)~
- How do you view the multi runtime architecture of dapr and layotto?
- Learn about graph database neo4j (I)
- HAVE FUN | SOFAArk 源码解析活动
- 视觉SLAM总结——SuperPoint / SuperGlue
- openstack详解(十八)——Nova服务启动与服务创建
猜你喜欢

Que pensez - vous des architectures Multi - temps comme DAPR et layotto?
![[1 data collection] complete learning path of data crawler](/img/73/5224cc4476f05aa190c135eea0aafd.jpg)
[1 data collection] complete learning path of data crawler

three. JS learning notes (16) -- turbulent ocean

MSF实战——MySQL空密码的危害

【图机器学习】图神经网络入门(一)谱图理论

【新手上路常见问答】非IT企业如何做互联网产品
![[technology, business and management] drama watching and Entrepreneurship: Silicon Valley season 5 Episode 7-8](/img/17/39590f150fab951c8210e078a10939.png)
[technology, business and management] drama watching and Entrepreneurship: Silicon Valley season 5 Episode 7-8

Moral and regulatory knowledge of data science

openstack详解(十二)——Glance安装与初步配置

- Bean method ‘redisConnectionFactory‘ in ‘JedisConnectionConfiguration‘ not loaded because @Conditi
随机推荐
LeetCode_ Stack_ Difficulties_ 394. string decoding
LeetCode_栈_困难_394. 字符串解码
Paper understanding [RL - exp replay] - an equivalence between loss functions and non uniform sampling in exp replay
MySQL basic DML and DDL learning
Neo4j realizes social recommendation (V)
[FAQs for novices on the road] basic principles of graphic design
【新手上路常见问答】平面设计的基本原则
XML to map (recursively call to read all node contents of XML) readxml read XML
LeetCode_ Binary tree_ Prefix and_ Medium_ 437. path sum III
MSF基于SSH协议的信息收集
HAVE FUN | SOFAArk 源码解析活动
[probability theory] correlation calculation between variables
pyqt5 pyside2
[practical skills] from the book "beautiful teams"
openstack详解(十四)——Glance Keystone注册
如何看待 Dapr、Layotto 这种多运行时架构?
openstack详解(十二)——Glance安装与初步配置
LeetCode_模拟_中等_621. 任务调度器
openstack详解(十八)——Nova服务启动与服务创建
[good book recommendation] popular science book of chip industry: core affairs