当前位置:网站首页>Ms17-010 Eternal Blue vulnerability of MSF
Ms17-010 Eternal Blue vulnerability of MSF
2022-06-30 22:42:00 【AI_ SumSky】
**
The main idea of the article :
**
1. be familiar with msf The basic usage of .
2. Be familiar with some of the basic windows command .
3. Repeat the blue hole of eternity .
Loophole principle :
Through to the Windows Server's SMBv1 The service sends a crafted command, causing an overflow , It eventually leads to the execution of arbitrary commands . stay Windows Operating system ,SMB The service is on by default , The listening port defaults to 445, Therefore, the impact of this vulnerability is great .
**
MSF Common commands :
show exploits Displays the available penetration attack modules
search Used to search for some penetration attack modules , Fuzzy matching can be done
use Use a penetration attack module , Can pass use Command to use show perhaps search Out of the penetration module
show payloads Displays the available attack payloads for the current module
show options Display parameters when the penetration module is selected , Use show options The parameters to be set for this module will be displayed
set The command is used to set some options , For example, use set Command settings , Attack module options Parameters ; Set attack load payloads when , Also use set command .
exploit/run command , When all parameters are set , Use exploit command , Start attacking
Exploit process :
**
1. open MSF It's integrated by default MS17-010 Vulnerability test module 
utilize search Syntax lookup ms17-010
2. Detect whether the host has vulnerabilities , utilize use Command selects the third test interface , It can detect whether the host has an eternal blue vulnerability , among show options Is to view the parameters to be configured , There is no destination host RHOSTS So we have to match .
To configure RHOSTS The target host ip( The target host here can also be a network segment ), And use run start-up , The result is shown in Fig. , Indicates a vulnerability .
3. After knowing that there are loopholes , Start using payload attack , Input use 0 Enter the attack interface , Prompt to configure parameters , utilize show options View the parameters to be configured 
First , Configure the target host RHOSTS, Then configure payload type ( This type defaults to 64 Bit host , If it is 32 Bit needs to download the corresponding script. After importing, the settings will X64 Remove it ), Configure the port to which this computer is connected 
Configure the parameters to pass run or exploit The startup script , See meterpreter Is to take advantage of success .
After successful use , We can do the following :
1. You can use the screenshot command screenshot Intercept the vulnerable Machine page 
The effect of interception is as follows :
2. It can also be used upload and download Upload and download files 
3. utilize load kiwi Command to crack the password of the active account of the host ,creds_all see

4. It can be done by shell The command enters the command line of the vulnerable machine administrator , If command line garbled code is available chcp 65001 Tone code into UTF-8,chcp 936 It's changed to GBK.
For the convenience of operation or further operation , If you want to log in to the host, you can log in through the remote port , But before that, we need to use Guest account number ( because Guest The account is the guest account of the system , If you log in with another account , Easy to arouse suspicion )
Activate Guest Account , You can also create an account , But new accounts are easy to find .
// Activate Guest Account
net user Guest /active:yes
// Will activate Guest User rights are elevated to the administrator account group
net localgroup administrator Guest /add
// Change user password
net user Guest 123
After completing the user operation, we need to use remote login , So open 3389 port , This is a remote access port .
// open 3389 Port command
REG ADD HKLM\SYSTEM\CurrentControlSet\Control\Terminal" "Server /v fDenyTSConnections
/t REG_DWORD /d 00000000 /f
// close 3389 Port command , Just put 00000000 become 11111111
REG ADD HKLM\SYSTEM\CurrentControlSet\Control\Terminal" "Server /v fDenyTSConnections
/t REG_DWORD /d 11111111 /f
Open another command line to pass rdesktop Command remote login to miss boarding 
Enter the password obtained before to enter the vulnerable machine 
5. To prevent being caught , Finally, you can use clearev Order the trace to be cleared , Will clear the system , Security , Application history log .
The renderings are as follows :
command : Vulnerable machines can be used netstat ano Check the port link status , Later, the defender will check the attack traces .
边栏推荐
- 2022-06-30:以下golang代码输出什么?A:0;B:2;C:运行错误。 package main import “fmt“ func main() { ints := make
- Where can I find the computer version of wechat files
- What does the software test report contain? How to obtain high quality software test reports?
- leetcode:104. Maximum depth of binary tree
- Neo4j load CSV configuration and use
- Win11如何优化服务?Win11优化服务的方法
- 企业出海数字化转型解决方案介绍
- d编译时计数
- 100 important knowledge points that SQL must master: creating and manipulating tables
- B_ QuRT_ User_ Guide(33)
猜你喜欢

Redis - 01 缓存:如何利用读缓存提高系统性能?

腾讯3年,功能测试进阶自动化测试,送给在手工测试中迷茫的你

How does win11 optimize services? Win11 method of optimizing service

How to change the win11 computer name? Win11 method of changing computer name

In depth analysis of Apache bookkeeper series: Part 4 - back pressure

What if the taskbar is blank after win11 update? Solution to blank and stuck taskbar after win11 update

Doker's container data volume

RIDE:获取图片base64

msf之ms17-010永恒之蓝漏洞

Esp8266 becomes client and server
随机推荐
Two way data binding in wechat applet
后疫情时代,云计算如何为在线教育保驾护航
深入解析 Apache BookKeeper 系列:第四篇—背压
Strictly minor spanning tree
Online customer service system code_ H5 customer service_ Docking with official account_ Support app_ Support for multiple languages
Graduation project
[fundamentals of wireless communication-13]: illustrated mobile communication technology and application development-1-overview
Nansen double disk encryption giant self rescue: how to prevent the collapse of billions of dominoes
A new one from Ali 25K came to the Department, which showed me what the ceiling is
leetcode:104. Maximum depth of binary tree
Yolo target detection
What is the experience of pairing with AI? Pilot vs alphacode, Codex, gpt-3
Win11电脑名如何更改?Win11更改电脑名的方法
Win11如何优化服务?Win11优化服务的方法
The superficial understanding of the industrial Internet finally brought the development of the industrial Internet into the strange circle of the consumer Internet
Esp8266 becomes client and server
多线程经典案例
How to judge whether the JS object is empty
在线客服系统代码_h5客服_对接公众号_支持APP_支持多语言
Fastjson V2 简单使用手册