2018-2019-2 《网络对抗技术》Exp5 msf 20165222
作者:互联网
本实践目标是掌握metasploit的基本应用方式,重点常用的三种攻击方式的思路。具体需要完成:
1.1一个主动攻击实践,如ms08_067; (1分)
ms03_049_netapi(失败)
ms04_007_killbill(失败)
ms04_011_lsass(失败)
ms04_031_netdde(失败)
ms05_039_pnp(失败)
ms06_025_rasmans_reg(失败)
ms06_025_rras(失败)
ms06_040_netapi(失败)
ms06_066_nwapi(失败)
ms06_066_nwwks(失败)
ms17_010永恒之蓝(成功);
1.2 一个针对浏览器的攻击,如ms11_050;(1分)
adobe_flash_avm2(失败)
ms06_001_wmf_setabortproc(失败)
ms06_013_createtextrange(失败)
ms06_055_vml_method(失败)
ms06_057_webview_setslice(失败)
ms06_067_keyframe(失败)
ms06_071_xml_core(失败)
ms07_017_ani_loadimage_chunksize(失败)
ms08_041_snapshotviewer(失败)
ms08_053_mediaencoder(失败)
ms08_070_visual_studio_msmask(失败)
ms08_078_xml_corruption(失败)
ms09_002_memory_corruption(失败)
ms09_043_owc_htmlurl(失败)
ms09_043_owc_msdso(失败)
ms09_072_style_object(失败)
ms10_002_aurora(失败)
ms10_002_ie_object(失败)
ms10_018_ie_behaviors(失败)
ms10_018_ie_tabular_activex(失败)
ms10_022_ie_vbscript_winhlp32(失败)
ms10_026_avi_nsamplespersec(失败)
ms10_042_helpctr_xss_cmd_exec(失败)
ms10_046_shortcut_icon_dllloader(失败)
ms10_090_ie_css_clip(失败)
ms11_003_ie_css_import(失败)
ms11_050_mshtml_cobjectelement(失败)
ms11_081_option(失败)
ms11_093_ole32(失败)
ms12_004_midi(失败)
ms12_037_ie_colspan(失败)
ms12_037_same_id(失败)
ms13_009_ie_slayoutrun_uaf(失败)
ms13_022_silverlight_script_object(失败)
ms13_037_svg_dashstyle(失败)
ms13_055_canchor(失败)
ms13_059_cflatmarkuppointer(失败)
ms13_069_caret(失败)
ms13_080_cdisplaypointer(失败)
ubisoft_uplay_cmd_exec(失败)
ultramjcam_openfiledig_bof(失败)
ultraoffice_httpupload(失败)
verypdf_pdfview(失败)
viscom_movieplayer_drawtext(失败)
vlc_amv(失败)
vlc_mms_bof(失败)
webdav_dll_hijacker(失败)
webex_ucf_newobject(失败)
wellintech_kingscada_kxclientdownload(失败)
winamp_playlist_unc(失败)
winamp_ultravox(失败)
1.3 一个针对客户端的攻击,如Adobe;(1分)
ms10_046_shortcut_icon_dllloader(成功且唯一);
ms15_020_shortcut_icon_dllloader(成功且唯一);
1.4 成功应用任何一个辅助模块。(0.5分)
标签:Exp5,ms13,ms10,失败,ms06,ms08,2019,ie,20165222 来源: https://www.cnblogs.com/20165222lixu/p/10742559.html