- msf免杀实验环境Kali 192.168.195.128Winser2008 192.168.195.129实验步骤启动postgresql.service systemctl restart postgresql.service启动msf msfconsole使用模块拿到Winser2008的shell制作伪装木马使用监听模块使用上传模块验证 msf免杀实验环境Kali 192.168.195.128Winser2008 192.168.195.129实验步骤启动postgresql.service systemctl restart postgresql.service启动msf msfconsole使用模块拿到Winser2008的shell制作伪装木马使用监听模块使用上传模块验证
- 远程连接实验环境Kali 192.168.195.132Winser2008 192.168.195.129实验步骤启动postgresql.service systemctl restart postgresql.service启动msf msfconsole使用模块拿到Winser2008的shell添加用户使用远程连接模块搜索模块 msf6 exploit(windows/smb/ms... 远程连接实验环境Kali 192.168.195.132Winser2008 192.168.195.129实验步骤启动postgresql.service systemctl restart postgresql.service启动msf msfconsole使用模块拿到Winser2008的shell添加用户使用远程连接模块搜索模块 msf6 exploit(windows/smb/ms...
- Kali ettercap DNS欺骗实验环境Kali IP:192.168.195.128 gateway 192.168.195.2Winser2008R2 IP:192.168.195.129 gateway:192.168.195.2网络互通:Winser2008R2 ping kali网络互通:kali ping Winser2008R2实验步骤修改ettercap解析文件 vim... Kali ettercap DNS欺骗实验环境Kali IP:192.168.195.128 gateway 192.168.195.2Winser2008R2 IP:192.168.195.129 gateway:192.168.195.2网络互通:Winser2008R2 ping kali网络互通:kali ping Winser2008R2实验步骤修改ettercap解析文件 vim...
- Metasploit实验环境Win2008R2 IP:192.168.10.130Kali IP:192.168.10.128实验步骤启用Metasploit启动postgresql服务搜索ms17_010找到辅助模块渗透扫描windows的samba服务 msf6 auxiliary(scanner/smb/smb_ms17_010) > use exploit/windows/smb/m... Metasploit实验环境Win2008R2 IP:192.168.10.130Kali IP:192.168.10.128实验步骤启用Metasploit启动postgresql服务搜索ms17_010找到辅助模块渗透扫描windows的samba服务 msf6 auxiliary(scanner/smb/smb_ms17_010) > use exploit/windows/smb/m...
上滑加载中