In addition to Weibo, there is also WeChat
Please pay attention
WeChat public account
Shulou
2025-01-16 Update From: SLTechnology News&Howtos shulou NAV: SLTechnology News&Howtos > Development >
Share
Shulou(Shulou.com)06/03 Report--
This article mainly explains "what is the process of intranet penetration". Interested friends may wish to have a look. The method introduced in this paper is simple, fast and practical. Let Xiaobian take you to learn "what is the process of intranet penetration"!
I. Description of vulnerability exploitation
The experiment was done in a virtual machine environment using the penetration tool library metaspolit
The requested URL/uploads/windows/fileformat/office_word_hta was not found on this server.
For operating systems:
Windows 7 32bit
Windows 10 64bit
II. Environment Description 2.1 Attack Machine Operating System
Recommended use:
Debian
Ubuntu
macOS
Kali linux(comes with tools)
Windows 10
Software/Tools Environment:
Metaspolit
2.2 attacked aircraft environment
Belongs to internal local area network
3.1 Open metaspolit
3.2 The requested URL/windows/fileformat/office_word_hta was not found on this server.
3.3 run
3.4 Link after victim enters Local IP
Click Run.
3.5 Generate sessions at metaspolit using generated files
3.6 viewing sessions
Executing the sessions command in the middle of a running session can reveal that the target attacker is already in the session
3.7 to elevate the attack aircraft.
Connect to the first session using the sessions -i ID number based on the ID number generated by the session above.
Use shell to raise power
You can see that you have been granted super administrator privileges.
Windows 10 test can also get super administrator privileges.
IV. protective measures
For individual users:
Install antivirus software without ads (such as tinder, etc.), and see unknown files do not click download or run, if automatically downloaded do not click run, delete directly will not establish a session.
v. conclusion
This vulnerability appears to be easy to exploit for Windows personal users who are less secure.
At this point, I believe everyone has a deeper understanding of "what is the process of intranet penetration". It is advisable to actually operate it. Here is the website, more related content can enter the relevant channels for inquiry, pay attention to us, continue to learn!
Welcome to subscribe "Shulou Technology Information " to get latest news, interesting things and hot topics in the IT industry, and controls the hottest and latest Internet news, technology news and IT industry trends.
Views: 0
*The comments in the above article only represent the author's personal views and do not represent the views and positions of this website. If you have more insights, please feel free to contribute and share.
Continue with the installation of the previous hadoop.First, install zookooper1. Decompress zookoope
"Every 5-10 years, there's a rare product, a really special, very unusual product that's the most un
© 2024 shulou.com SLNews company. All rights reserved.