渗透测试(Penetration Testing)之一:开篇

该博客介绍了渗透测试的用途和适用人群,包括乙方安全测试、甲方安全自检等。还讲解了利用windows exp提权,如检查未打补丁的exp、查看用户账户信息,利用K8工具提权及主机扫描用法等,同时给出了linux提权exp的参考链接。

摘要生成于 C知道 ,由 DeepSeek-R1 满血版支持, 前往体验 >

课程参考网址:https://github.com/Micropoor/Micro8

1、渗透测试有何用?谁可以做渗透测试?

乙方安全测试,甲方安全自检,网络安全爱好者等,企业安全防护与提高。安全从业者可以从渗透测试开始,无论是测试还是攻防,都需要懂渗透测试。

2、利用windows exp提权

检查windows未打补丁的exp,可用如下cmd代码:

systeminfo > micropoor.txt & (for %i in (KB977165 KB2160329 KB2503665 KB2592799  KB2707511 KB2829361 KB2850851 KB3000061   KB3045171 KB3077657 KB3079904  KB3134228 KB3143141  KB3141780) do @type micropoor.txt|@find /i "%i"||@echo %i you can fuck) & del /f /q /a micropoor.txt

输出结果如下:

KB977165 you can fuck
KB2160329 you can fuck
KB2503665 you can fuck
KB2592799 you can fuck
KB2707511 you can fuck
KB2829361 you can fuck
KB2850851 you can fuck
KB3000061 you can fuck
KB3045171 you can fuck
KB3077657 you can fuck
KB3079904 you can fuck
KB3134228 you can fuck
KB3143141 you can fuck
KB3141780 you can fuck

windows的cmd下也可以执行whoami,然后用net user xxx,可以查看相关用户账户信息。

发现有未打补丁的exp漏洞之后,就可以利用K8工具提权,参考链接:

工具使用说明:https://www.cnblogs.com/k8gege/p/10474326.html

工具下载:https://github.com/k8gege/K8tools

K8Cscan3.8主机扫描用法:

检测存活(目标内外网均可使用)
cscan (直接运行)
cscan 192.168.1.108 (单个IP)
cscan 192.168.1.108/24 (C段)
cscan 192.168.1.108/16 (B段)
cscan 192.168.1.108/8  (A段)
cscan 192.168.1.0 192.168.5.0 (C段范围)
不存测存活(代理或禁ICMP时用)
cscan nocheck (直接运行)
cscan nocheck 192.168.1.108 (单个IP)
cscan nocheck 192.168.1.108/24 (C段)
cscan nocheck 192.168.1.108/16 (B段)
cscan nocheck 192.168.1.108/8  (A段)
cscan nocheck 192.168.1.0 192.168.5.0 (C段范围)

端口扫描:

默认43个端口

python K8PortScan.py -ip 192.11.22.29

3、linux提权exp

https://github.com/SecWiki/linux-kernel-exploits

 

Penetration Testing Bootcamp English | 2017 | ISBN-10: 1787288749 | 258 pages | PDF + EPUB + MOBI(conv) | 4.16 Mb Key Features Get practical demonstrations with in-depth explanations of complex security-related problems Familiarize yourself with the most common web vulnerabilities Get step-by-step guidance on managing testing results and reporting Book Description Penetration Testing Bootcamp delivers practical, learning modules in manageable chunks. Each chapter is delivered in a day, and each day builds your competency in Penetration Testing. This book will begin by taking you through the basics and show you how to set up and maintain the C&C Server. You will also understand how to scan for vulnerabilities and Metasploit, learn how to setup connectivity to a C&C server and maintain that connectivity for your intelligence gathering as well as offsite processing. Using TCPDump filters, you will gain understanding of the sniffing and spoofing traffic. This book will also teach you the importance of clearing up the tracks you leave behind after the penetration test and will show you how to build a report from all the data obtained from the penetration test. In totality, this book will equip you with instructions through rigorous tasks, practical callouts, and assignments to reinforce your understanding of penetration testing. What you will learn Perform different attacks such as MiTM, and bypassing SSL encryption Crack passwords and wireless network keys with brute-forcing and wordlists Test web applications for vulnerabilities Use the Metasploit Framework to launch exploits and write your own Metasploit modules Recover lost files, investigate successful hacks, and discover hidden data Write organized and effective penetration testing reports About the Author Jason Beltrame is a Systems Engineer for Cisco, living in the Eastern Pennsylvania Area. He has worked in the Network and Security field for 18 years, with the last 2 years as a Systems Engineer, and the prio
评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值