被攻击者IP:192.168.128.149 操作系统:Windows Server 2003
第一步,检测数据库的连接状态:
msf > db_status
[*] postgresql connected to msf
第二步:开始扫描运行的服务:
msf > db_nmap -sS -sV -O -n 192.168.128.149
[*] Nmap: Starting Nmap 7.50 ( https://nmap.org ) at 2017-08-06 16:54 CST
[*] Nmap: Nmap scan report for 192.168.128.149
[*] Nmap: Host is up (0.00025s latency).
[*] Nmap: Not shown: 986 closed ports
[*] Nmap: PORT STATE SERVICE VERSION
[*] Nmap: 21/tcp open ftp Microsoft ftpd
[*] Nmap: 80/tcp open http Microsoft IIS httpd 6.0
[*] Nmap: 135/tcp open msrpc Microsoft Windows RPC
[*] Nmap: 139/tcp open netbios-ssn Microsoft Windows netbios-ssn
[*] Nmap: 445/tcp open microsoft-ds Microsoft Windows 2003 or 2008 microsoft-ds
[*] Nmap: 777/tcp open multiling-http?
[*] Nmap: 1025/tcp open msrpc Microsoft Windows RPC
[*] Nmap: 1026/tcp open msrpc Microsoft Windows RPC
[*] Nmap: 1027/tcp open msrpc Microsoft Windows RPC
[*] Nmap: 1031/tcp open msrpc Microsoft Windows RPC
[*] Nma

本文介绍了如何使用kali Linux针对一台运行Windows Server 2003的设备进行渗透测试。首先通过db_nmap进行端口扫描,发现开放了多个端口,包括FTP、HTTP、RPC等。接着搜索并利用MS08_067漏洞,成功触发漏洞并获取了目标系统的命令行shell。
最低0.47元/天 解锁文章
1313

被折叠的 条评论
为什么被折叠?



