当前位置:网站首页>Simple process of penetration test
Simple process of penetration test
2022-07-05 13:54:00 【Cwxh0125】
Simple process
One . information gathering
nslookup whois
Two . Scan for leaks
namp=IP Range port 80 (iss,apache, What website )
Advanced scanning : Such as iss Loophole Scanning for website vulnerabilities
3、 ... and . Exploit
Four . Raise the right (shell Environmental Science , Desktop Environment , Highest authority ))
Manually test port number open : talent IP Address Test port
5、 ... and . Destroy the bodies
6、 ... and . leave oneself a way out
7、 ... and . Penetration test report
Practice
Open two virtual machines
win2003 The server 10.1.1.2
winxp staff 10.1.1.1
use xp attack 2003
First, two virtual machines should be able to communicate To configure IP In the same LAN


After the configuration is completed, try xp On ping once 2003 ping success

Next The attack
attack 445 attack ( Shared port )
First step : Port scanning
Manual scanning
telnet IP port The following situations represent that the corresponding port is open 

Automatic scanning Use scanport

You can see xp and 2003 Both virtual machines are turned on 445 port

445 One of the exploits ipc$:
net use Used to connect your computer to shared resources ( Establish disk mapping ), Or disconnect the computer from shared resources ( Delete disk mapping ), When using this command without options , It lists the computer connections .
1) Make an empty connection :
net use \\IP\ipc$ "" /user:"" ( Be sure to pay attention to : This line of command contains 3 A space )
2) Establish a non empty connection :
net use \\IP\ipc$ " password " /user:" user name " ( There are also 3 A space )
3) Map default share :
net use z: \\IP\c$ " password " /user:" user name " ( You can put the other party's c The disk maps to its own z disc , And so on )
If you've established a goal ipc$, You can use IP+ Disk character +$ visit , Specific commands net use z: \\IP\c$
4) Delete one ipc$ Connect
net use \\IP\ipc$ /del
5) Delete shared mapping
net use c: /del Delete mapped c disc , And so on
net use * /del Delete all , There will be a prompt to press y confirm
3 View the shared resources of the remote host ( But you don't see the default share )
net view \\IP
Brutally crack the system password 445
Using tools ntscan

take user And the password burst out You can go through net use \\IP\ipc$ " password " /user:" user name " To make a connection


After successful connection, the back door can be left
Make a Trojan

copy Implant Trojans
边栏推荐
- Aspx simple user login
- Brief introduction to revolutionary neural networks
- UE源码阅读[1]---由问题入手UE中的延迟渲染
- Jasypt configuration file encryption | quick start | actual combat
- Pancake Bulldog robot V2 (code optimized)
- Nantong online communication group
- Godson 2nd generation burn PMON and reload system
- 昆仑太科冲刺科创板:年营收1.3亿拟募资5亿 电科太极持股40%
- 常见问题之PHP——Fatal error: Allowed memory size of 314572800 bytes exhausted...
- UE source code reading [1]--- starting with problems delayed rendering in UE
猜你喜欢

Usage, installation and use of TortoiseSVN

Idea remote debugging agent

These 18 websites can make your page background cool

Those things I didn't know until I took the postgraduate entrance examination

LeetCode_2(两数相加)

Brief introduction to revolutionary neural networks

Anchor navigation demo
Jetpack compose introduction to mastery

Convolutional Neural Networks简述

Zibll theme external chain redirection go page beautification tutorial
随机推荐
Prefix, infix, suffix expression "recommended collection"
NFT value and white paper acquisition
Aikesheng sqle audit tool successfully completed the evaluation of "SQL quality management platform grading ability" of the Academy of communications and communications
Nantong online communication group
Could not set property 'ID' of 'class xx' with value 'XX' argument type mismatch solution
What is information security? What is included? What is the difference with network security?
Primary code audit [no dolls (modification)] assessment
Matlab learning 2022.7.4
什么叫做信息安全?包含哪些内容?与网络安全有什么区别?
我为什么支持 BAT 拆掉「AI 研究院」
Requests + BS4 crawl Douban top250 movie information
Liste des liens (simple)
How to apply the updated fluent 3.0 to applet development
leetcode 10. Regular expression matching regular expression matching (difficult)
Those things I didn't know until I took the postgraduate entrance examination
Programmer growth Chapter 8: do a good job of testing
Source code analysis of etcd database -- peer RT of inter cluster network layer client
Basic characteristics and isolation level of transactions
[js] basic syntax - for loop
::ffff:192.168.31.101 是一个什么地址?