The network security engineer demonstrates: How does *** do Windows 7 computer*** actual combat? (Practical articles)

Statement before class:
1. This sharing is only for learning exchanges, please consciously abide by laws and regulations!
2. Search: Kali and programming, learn more online*** dry goods!
3. Kali and programming are updated on time every day, please learn and pay attention!
Text part
1. Background introduction
Metasploit is a vulnerability framework. Its full name is The Metasploit Framework, or MSF for short. As the most popular tool in the world, Metasploit is not only because of its convenience and power, but more importantly because of its framework. It allows users to develop their own vulnerability scripts for testing. How powerful is Metasploit (msf)? How to use VPN to control the victim host? How to remotely start the remote desktop connection service of the victim host? Let us study together next!
2. Resource equipment
1. Win7 virtual machine successfully won
2. A Xiaobai ready to go.
3. One installed Kali Linux virtual machine.
3. Strategic arrangement
3.1 Enter the conversation control interface with the already won Windows7, as shown in the figure below.
Insert picture description here

3.2 Execute the script file and open the remote desktop service of the victim's host on the host of the victim, as shown in the figure below.
Command: run getgui -e
Insert picture description here

3.3 Check the execution result of the last command on the victim host, as shown in the figure below.
Steps: Windows/Computer/System Properties/Advanced System Settings/Remote,
as shown in the figure below, successfully opened the remote desktop service of the victim's host through a remote command.
Insert picture description here

3.4 Check the IP address of the victim's host, as shown in the figure below.
Command: ipconfig (check the IP address of the Windows host)
Command: ifconfig (check the IP address of the linux host)
Insert picture description here

3.5 Use the remote desktop tool to connect to the victim's host, as shown in the figure below.
Command: rdesktop victim host IP: 3389
Insert picture description here

3.6 As shown in the figure below, enter the remote desktop login interface of the victim host and select another user to log in.
Insert picture description here

3.7 Enter the account information just created to log in, as shown in the figure below.
Insert picture description here

3.8 Dealing with the error message that appears, login failed, as shown in the figure below.
Ps: Because the account information created just now does not belong to the administrator group, adding the account to the administrator group can solve the error. Please see the following operation.
Insert picture description here

3.9 Enter the dos interface of the victim's Windows host, as shown in the figure below.
Command: shell
Insert picture description here

3.10 Add the newly created account to the administrator group, as shown in the figure below.
Command: net localgroup administrators username/add
Example: net localgroup administrators hacker /add
Insert picture description here

3.11 Change the console garbled problem, as shown in the figure below.
Command: chcp 65001
Insert picture description here

3.12 Use the remote desktop login tool to log in again (see 3.5 for specific commands)
Insert picture description here
Insert picture description here

3.13 As shown in the figure below, the remote connection to the victim host is successful!
Insert picture description here
The editor typed each word and created it, but it was hard work. Could you please pay attention to me? You can also search for: Kali and programming to learn more *** skills! Refuse to piracy, please declare the source for reprinting: Kali and programming
point I will learn more Kali Linux*** testing and network*** practical skills!

Guess you like

Origin blog.51cto.com/14308022/2550614