当前位置:网站首页>Simple process of penetration test
Simple process of penetration test
2022-07-05 13:54:00 【Cwxh0125】
Simple process
One . information gathering
nslookup whois
Two . Scan for leaks
namp=IP Range port 80 (iss,apache, What website )
Advanced scanning : Such as iss Loophole Scanning for website vulnerabilities
3、 ... and . Exploit
Four . Raise the right (shell Environmental Science , Desktop Environment , Highest authority ))
Manually test port number open : talent IP Address Test port
5、 ... and . Destroy the bodies
6、 ... and . leave oneself a way out
7、 ... and . Penetration test report
Practice
Open two virtual machines
win2003 The server 10.1.1.2
winxp staff 10.1.1.1
use xp attack 2003
First, two virtual machines should be able to communicate To configure IP In the same LAN
After the configuration is completed, try xp On ping once 2003 ping success
Next The attack
attack 445 attack ( Shared port )
First step : Port scanning
Manual scanning
telnet IP port The following situations represent that the corresponding port is open
Automatic scanning Use scanport
You can see xp and 2003 Both virtual machines are turned on 445 port
445 One of the exploits ipc$:
net use Used to connect your computer to shared resources ( Establish disk mapping ), Or disconnect the computer from shared resources ( Delete disk mapping ), When using this command without options , It lists the computer connections .
1) Make an empty connection :
net use \\IP\ipc$ "" /user:"" ( Be sure to pay attention to : This line of command contains 3 A space )
2) Establish a non empty connection :
net use \\IP\ipc$ " password " /user:" user name " ( There are also 3 A space )
3) Map default share :
net use z: \\IP\c$ " password " /user:" user name " ( You can put the other party's c The disk maps to its own z disc , And so on )
If you've established a goal ipc$, You can use IP+ Disk character +$ visit , Specific commands net use z: \\IP\c$
4) Delete one ipc$ Connect
net use \\IP\ipc$ /del
5) Delete shared mapping
net use c: /del Delete mapped c disc , And so on
net use * /del Delete all , There will be a prompt to press y confirm
3 View the shared resources of the remote host ( But you don't see the default share )
net view \\IP
Brutally crack the system password 445
Using tools ntscan
take user And the password burst out You can go through net use \\IP\ipc$ " password " /user:" user name " To make a connection
After successful connection, the back door can be left
Make a Trojan
copy Implant Trojans
边栏推荐
- Comparison of several distributed databases
- Embedded software architecture design - message interaction
- matlab学习2022.7.4
- 2022年机修钳工(高级)考试题模拟考试题库模拟考试平台操作
- What is information security? What is included? What is the difference with network security?
- 如何把大的‘tar‘存档文件分割成特定大小的多个文件
- Hide Chinese name
- 荐号 | 有趣的人都在看什么?
- Log4j utilization correlation
- 2022 driller (drilling) examination question bank and simulation examination
猜你喜欢
Why do I support bat to dismantle "AI research institute"
Laravel dompdf exports PDF, and the problem of Chinese garbled code is solved
redis6主从复制及集群
Scientific running robot pancakeswap clip robot latest detailed tutorial
RK3566添加LED
清大科越冲刺科创板:年营收2亿 拟募资7.5亿
Idea remote debugging agent
Rk3566 add LED
The development of speech recognition app with uni app is simple and fast.
Elfk deployment
随机推荐
Catch all asynchronous artifact completable future
清大科越冲刺科创板:年营收2亿 拟募资7.5亿
NFT value and white paper acquisition
Matlab learning 2022.7.4
ELK 企业级日志分析系统
Godson 2nd generation burn PMON and reload system
Redis6 data type and operation summary
When there are too many input boxes such as input transmitted at one time in the form, the post data is intercepted
Data Lake (VII): Iceberg concept and review what is a data Lake
Network security - Novice introduction
Wonderful express | Tencent cloud database June issue
[South China University of technology] information sharing of postgraduate entrance examination and re examination
LeetCode_2(两数相加)
Programmer growth Chapter 8: do a good job of testing
Nantong online communication group
Rk3566 add LED
LeetCode_3(无重复字符的最长子串)
asp. Net read TXT file
【公开课预告】:视频质量评价基础与实践
Aikesheng sqle audit tool successfully completed the evaluation of "SQL quality management platform grading ability" of the Academy of communications and communications