Label:Service PostgreSQL Start[....] Starting PostgreSQL 9.1 database server:main[...] The PostgreSQL server failed to start. Please check the log output:2015-02-07 18:52:12 CST log:could not translate host name "localhost" and service "5432" to add Ress:name or service not known 2015-02-07 18:52:12 CST warning:could not create listen sockets for "localhost" 2015-02-07 18:52:12 CST Fatal:could Not the Create any TCP/IP sockets. [F failed!failed!/etc/hostsAdd "127.0.0.1 localhost"
Linux under:
Enter MSFDsudo msfd
Open connectionMsfd-a
To see if the port is openNetstat-tn
Remote Connectivity MSF
NC
Under Windows:
Open connectionmsf> load MSFD servername= Your IP address serverport= your port
View ConnectionNetstat-na
Access using TelnetTelnet
Window may appear garbled, here is recommended to use an open source software putty, with a simple instructions:
Here, choose Telnet, and then fill in the IP and port (hint:
; Rtm[*] nmap:2383/tcp open MS-OLAP4? [*] Nmap:3306/tcp open mysql MySQL (Unauthorized) [*] nmap:3389/tcp open ms-wbt-server Microsoft Terminal service[*] Nmap:mac address:00:0c:29 : 5d:f3:e7 (VMware) [*] nmap:no exact OS matches forhost (If you know what OS isrunning onit, see http:// nmap.org/submit/). [*] NMAP:TCP/IP fingerprint:[*] Nmap:OS:SCAN (v=6.25%e=4%d=7/12%ot=80%ct=1%cu=32534%pv=y%ds=1%dc=d%g=y%m=000c29%t[*] NMAP:OS:M=53C14991%P=I686-PC-LINUX
Tags: server system brings integration files SP1-side system version relatedNmap with Metasploit for port scanning 1.Nmap Scanner Basic Use 1.1 introductionNmap (Network Mapper) is the first web scanning sniffer under Linux. Its basic functions are three:
Detecting whether a group of hosts is online;
Scan the host port to sniff out the network services it provides;
Infer the operating syste
proxy:apt-get install network-manager-openvpn-gnomeapt-get install network-manager-pptpapt-get Install network-manager-pptp-gnomeapt-get install network-manager-strongswanapt-get install network-manager-vpncapt-get install network-manager-vpnc-gnome/etc/init.d/network-manager restart Check all the options in the Advanced settings (this is the personal try mode)7. running the Metasploit Framework In accordance with the Kali
databaseThen exit into the MSF connection databasedb_connect root:[emailprotected]localhost/nexp_dbAfter successful connection, you will be prompted:[-] PostgreSQL already connected to MSF [-] Run db_disconnect First If you wish to connect to a different database Msfconsole support System All commands, enter help in terminal to view "Core Commands", "Database backend Commands", "Exploit Commands"Several vulnerability scanning components of MSF integration NmapNmap is suitable for WINODW
Use the Tomcat console default password vulnerability, upload Trojan file, get target host Webshell.When the Tomcat console is installed, you need to modify the default management account in a timely manner and eliminate the weak password, and
(1) Install the Python msgpack class library, The data serialization standard in the MSF official documentation is reference msgpack. [Email protected]:~# apt-get Install Python-setuptools[Email protected]:~# easy_install Msgpack-python(2) create
Package Attack payloadMsfpayload:Usage:Msfpayload [] [Var=val] Summary:summary and Optons of payloadC:c languagePerl:perlRuby:rubyRaw:raw,allows payload to being piped into msfencode and other toolsJs:javascriptExe:windows
This is part of a professional practice of my present knot, carefully taken out to share.
In the project, the attack module not only provides the automatic attack function, but also provides the user extension platform, and makes the effective
First, Msfconsole? Help MenuBack from the current environmentBanner shows an MSF bannerCD Switch DirectoryColor conversionConnect a HostExit MSFHelp MenuInfo displays information for one or more modulesIRB enters IRB scripting modeJobs display and
Nexpose installed in the virtual machine is more cumbersome, so directly installed on the physical machine, Kali installed in the virtual machine, perform the scan command as follows:First determine whether to connect to the database:MSF > Db_status[
Exploit/windows/smb/psexec
Using BT5 to hack an intrusion into the internal network
Destination IP address 192.168.111.135 (Windows Server 2003 SP2)
BT5 IP Address 192.168.111.134
Intrusion condition: Know the target machine's IP username
Meterpreter > Run packetrecorder-i 1
[*] starting Packet capture on interface 1
[+] Packet capture started
[*] Packets being saved in to/root/.msf4/logs/scripts/packetrecorder/root-9743dd32e3_20130427.1003/root-9743dd32e3 _20130427.1003.cap
[*]
MSF > Load NessusMSF > Nessus_connect fuckyou:[email Protected] Connect on NessusMSF > Nessus_user_add Add a Nessus userElevate the test user to admin[Email protected]:# nessus-adminLogin:xxxoooYest is isn't an administrative user. Does want to
Penetration Testing Process:1. The Pre-interaction phase (pre-engagement Interaction), the penetration Test team interacts with the customer organization to determine the scope of penetration, objectives, constraints, and details of the service
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.