当前位置:网站首页>Network security -- Service Vulnerability scanning and utilization
Network security -- Service Vulnerability scanning and utilization
2022-07-24 13:42:00 【Beluga】
Service Vulnerability scanning and utilization
First step , Open the network topology , Start the experimental virtual machine , View the virtual machines separately IP Address :
Kali Linux

Windows 7

1. Through the infiltration machine Kali Linux For the target scene Windows 7 Conduct system service and version scanning penetration test , And display the operation in the result 3389 The service status information corresponding to the port is used as Flag Value submission ;
Get into kali The following commands are used in the command console

Flag:open
2. stay msfconsole of use search The command to search MS12020 RDP Denial of service attack module , The vulnerability disclosure time in the echo result is taken as Flag value ( Such as :2012-10-16) Submit ;
Use command msfconsole Get into kali Penetration testing platform , Then use the command search ms12_020 Search for RDP Denial of service attack module .

Flag:2012-03-16
3. stay msfconsole In the use of MS12020 RDP Denial of Service Vulnerability auxiliary scanning module , Call the command of this module as Flag Value submission ;
Use command use auxiliary/scanner/rdp/ms12_020_check

Flag:use auxiliary/scanner/rdp/ms12_020_check
4. In the 3 Check the options you need to set based on the questions , And take the option name that must be set in the echo as Flag Value submission ;
Use the command based on the previous question show options Check the parameters to be configured , find Required The status in the column is yes And the parameter name that is empty in the parameter setting column

Flag:RHOSTS
5. Use set Command set target IP( In the 4 Based on the question ), And detect whether the vulnerability exists , Run this module to take the last word in the penultimate line of the echo result as Flag Value submission ;
Use command exploit To detect the existence of vulnerabilities in the target system

Flag:complete
6. stay msfconsole In the use of MS12020 RDP Denial of service attack module , Call the command of this module as Flag Value submission ;
Use the following command use auxiliary/dos/windows/rdp/ms12_020_maxchannelids call ms12_020 RDP Denial of service attack module .
![]()
Flag:use auxiliary/dos/windows/rdp/ms12_020_maxchannelids
7. Use set Command set target IP( In the 6 Based on the question ), Use MS12020 Denial of service attack module , Run this module to take the last word in the penultimate line of the echo result as Flag Value submission ;
Use command set RHOSTS Set the target IP Address , Then use the command exploit function RDP Denial of service module , View echo results

Flag:completed
8. Enter the target and close the remote desktop service , Run again MS12020 Denial of service attack module , Run this module and take the last word in the penultimate line of the echo result as Flag Value submission .
Enter the target and close the remote desktop service

Then use the command rexploit Run again RDP Denial of service module , View echo results

Flag:Unreachable
边栏推荐
- Common OJ questions of stack and queue
- 2021年最新最全Flink系列教程_Flink原理初探和流批一体API(二.五)v2
- Dtcloud uses custom fonts
- Flink高级特性和新特性(八)v2
- Flink高级特性和新特性(八)
- Flink综合案例(九)
- Interview question 01.02. determine whether it is character rearrangement
- Network security - file upload blacklist bypass
- AtCoder Beginner Contest 261 F // 树状数组
- [acm/ two points] two points clear entry-level explanation
猜你喜欢

网络安全——过滤绕过注入

开放环境下的群智决策:概念、挑战及引领性技术

网络安全——使用Exchange SSRF 漏洞结合NTLM中继进行渗透测试

【无标题】

网络安全——函数绕过注入

网络安全——报错注入

Network security - file upload blacklist bypass

爱可可AI前沿推介(7.24)

How to generate expected data? Emory University and others' latest "deep learning controllable data generation" review, 52 page PDF, covering 346 documents, comprehensively expounds the controllable g

简易订单管理系统小练习
随机推荐
Group knowledge map: distributed knowledge transfer and federated map reasoning
网络安全——使用Exchange SSRF 漏洞结合NTLM中继进行渗透测试
How to verify the domain name after applying for SSL digital certificate?
三层交换机配置MSTP协议详解【华为eNSP实验】
Why are there "two abstract methods" in the functional interface comparator?
在EXCEL表格中如何进行快速换行
网络安全——WAR后门部署
支持鹏程系列开源大模型应用生态演化的可持续学习能力探索
Overview of multi view learning methods based on canonical correlation analysis
Simple use and difference of symmetric res, AES and asymmetric RSA (JWT)
Browser type judgment
Swarm intelligence collaborative obstacle avoidance method inspired by brain attention mechanism
Introduction to single chip microcomputer
AtCoder Beginner Contest 261 F // 树状数组
Is it safe for Huatai Securities to open an account through channels? Is it formal
网络安全——文件上传渗透测试
Odoo+ test
Collection collection framework
基于社会媒体数据增强的交通态势感知研究及进展
使用activiti创建数据库表报错