First, Msfconsole? Help MenuBack from the current environmentBanner shows an MSF bannerCD Switch DirectoryColor conversionConnect a HostExit MSFHelp MenuInfo displays information for one or more modulesIRB enters IRB scripting modeJobs display and
Nexpose installed in the virtual machine is more cumbersome, so directly installed on the physical machine, Kali installed in the virtual machine, perform the scan command as follows:First determine whether to connect to the database:MSF > Db_status[
Exploit/windows/smb/psexec
Using BT5 to hack an intrusion into the internal network
Destination IP address 192.168.111.135 (Windows Server 2003 SP2)
BT5 IP Address 192.168.111.134
Intrusion condition: Know the target machine's IP username
Meterpreter > Run packetrecorder-i 1
[*] starting Packet capture on interface 1
[+] Packet capture started
[*] Packets being saved in to/root/.msf4/logs/scripts/packetrecorder/root-9743dd32e3_20130427.1003/root-9743dd32e3 _20130427.1003.cap
[*]
MSF > Load NessusMSF > Nessus_connect fuckyou:[email Protected] Connect on NessusMSF > Nessus_user_add Add a Nessus userElevate the test user to admin[Email protected]:# nessus-adminLogin:xxxoooYest is isn't an administrative user. Does want to
Experiment Introduction
Experiment Series: Security Tools use
Subjects: Undergraduate/specialist Information security major
Related courses and majors: Linux Foundation, cyber security
Experimental Category: Practical Experimental class
Pre-knowledgeArmitage Basic Introduction Armitage is a Java-written Metasploit graphical interface attack software that can be used in conjunction with Me
Nbsp; first, upgrade to root. For more information, see vexs @ Ubuntu11 :~ $ Sudopasswdroot [sudo] passwordforvexs: EnternewUNIXpassword: RetypenewUNIXpassword: passwd: passwordupdatedsuccessfully nbsp; vex
First, upgrade to root to facilitate the operation:
Vexs @ Ubuntu11 :~ $ Sudo passwd root[Sudo] password for vexs:Enter new UNIX password:Retype new UNIX password:Passwd: password updated successfullyVexs @ Ubuntu11 :~ $ SuPassword:Root @ Ubuntu11:/home/vexs #Then, according to S4 (the Comma
Intranet penetration 1: Use the Xss vulnerability to access the Intranet
0x01: Popular Science
Beef is currently The most popular WEB Framework attack platform in Europe and America. Its full name is: The Browser Exploitation Framework Project. beef uses a simple XSS vulnerability to write JavaScript (hook. js) controls the browser of the target host, obtains detailed information about the host through the browser of the target host, and further scans the Intranet. In combination with
Several steps to install:
0x00-from GitHub clone Metasploit project to local;
0x01-installation of PostgreSQL and configuration;
0x02-installs specific versions of Ruby, and resolves dependencies;
0x00 clones the Metasploit project from the GitHub to the local
Say GitHub is really everything, a lot of good projects can be found on the top, first open the terminal and enter the following command, becaus
a Web backdoor through this web backdoor through a SELECT clause into outfile in the writable directory of the host on which the Web is hosted to execute commands. Sqlmap supports this technology and requires users to provide a comma-separated path that may be a writable directory. SQLMAP supports the following server-side scripting languages:
Asp
asp
Jsp
Php
2. Out-of-band TCP connection: Meterpreter and relatedParameters:--os-pwn 、--os-smbrelay 、--os-bof 、--priv-esc
21st Lesson
Sqlmap default modification (around WAF, water meter)
Metasploit Special Topics
First lesson
Metasploit Introduction and Basic commands
Lesson Two
Metasploit Information Collection
Lesson Three
Metasploit using a modu
Tags: server system brings integration files SP1-side system version relatedNmap with Metasploit for port scanning 1.Nmap Scanner Basic Use 1.1 introductionNmap (Network Mapper) is the first web scanning sniffer under Linux. Its basic functions are three:
Detecting whether a group of hosts is online;
Scan the host port to sniff out the network services it provides;
Infer the operating system used by the host.
1.2 Basic commands
updated on the basis of the previous version, nine Chapters are added. This book is rich in content and provides a thorough description of the latest vulnerabilities, repair methods, and legal public channels. It provides detailed information on malware analysis, penetration testing, SCADA, VoIP, Web security, and other topics, analyzes how hackers locate the system, damage the protection scheme, write malicious code, and exploit the defects of Windows and Linux systems. With this book, you wil
The exploit phase utilizes the information obtained and the various attack methods to implement infiltration. An encrypted communication vulnerability diagnosis for a Network application vulnerability diagnostic project must be performed. As the name implies, exploit the vulnerability to achieve the purpose of the attack.
Metasploit Framework
Rdesktop + Hydra
Sqlmap
Arpspoof
Tcpdump + Ferret + Hamster
Ettercap
Metasploit Implement Trojan, bundle, no kill 1. Preliminary knowledge(1) MetasploitMetasploit is an open source security vulnerability detection Tool, called the Metasploit Framework, or MSF. MSF is a vulnerability framework that allows users to develop their own vulnerability scripts for testing. Architecture for Metasploit:?????????? Photo Source play
Veil is a compatible payload tool built using the Metasploit framework and bypasses common antivirus software in most network environments. This section describes the installation and use of the Veil tool.In Kali Linux, the Veil tool is not installed by default. Here, first install the Veil tool and execute the command shown below:[emailprotected]:~# apt-get install veilAfter executing the above command, if the installation process does not indicate a
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.