[{"createTime":1735734952000,"id":1,"img":"hwy_ms_500_252.jpeg","link":"https://activity.huaweicloud.com/cps.html?fromacct=261f35b6-af54-4511-a2ca-910fa15905d1&utm_source=V1g3MDY4NTY=&utm_medium=cps&utm_campaign=201905","name":"华为云秒杀","status":9,"txt":"华为云38元秒杀","type":1,"updateTime":1735747411000,"userId":3},{"createTime":1736173885000,"id":2,"img":"txy_480_300.png","link":"https://cloud.tencent.com/act/cps/redirect?redirect=1077&cps_key=edb15096bfff75effaaa8c8bb66138bd&from=console","name":"腾讯云秒杀","status":9,"txt":"腾讯云限量秒杀","type":1,"updateTime":1736173885000,"userId":3},{"createTime":1736177492000,"id":3,"img":"aly_251_140.png","link":"https://www.aliyun.com/minisite/goods?userCode=pwp8kmv3","memo":"","name":"阿里云","status":9,"txt":"阿里云2折起","type":1,"updateTime":1736177492000,"userId":3},{"createTime":1735660800000,"id":4,"img":"vultr_560_300.png","link":"https://www.vultr.com/?ref=9603742-8H","name":"Vultr","status":9,"txt":"Vultr送$100","type":1,"updateTime":1735660800000,"userId":3},{"createTime":1735660800000,"id":5,"img":"jdy_663_320.jpg","link":"https://3.cn/2ay1-e5t","name":"京东云","status":9,"txt":"京东云特惠专区","type":1,"updateTime":1735660800000,"userId":3},{"createTime":1735660800000,"id":6,"img":"new_ads.png","link":"https://www.iodraw.com/ads","name":"发布广告","status":9,"txt":"发布广告","type":1,"updateTime":1735660800000,"userId":3},{"createTime":1735660800000,"id":7,"img":"yun_910_50.png","link":"https://activity.huaweicloud.com/discount_area_v5/index.html?fromacct=261f35b6-af54-4511-a2ca-910fa15905d1&utm_source=aXhpYW95YW5nOA===&utm_medium=cps&utm_campaign=201905","name":"底部","status":9,"txt":"高性能云服务器2折起","type":2,"updateTime":1735660800000,"userId":3}]
实验环境:
虚拟机:kali-linux windows 7(未装补丁)
获取IP地址
kali-linux : 192.168.146.136
windows7 : 192.168.146.129
输入service postgresql status 查看是否开启postgresql服务
执行 service postgresql start
、
输入msfconsole启动msf(若不是root登陆需sudo提升权限)
这里先对win7进行漏洞扫描
先使用nmap nmap进行扫描进行信息收集
发现原因是win7 网络共享没开
进win7虚拟机 网络开启共享
在扫描一次
查看漏洞模块——search ms17-010
可以看到有auxiliary(辅助)模块和exploit(攻击)模块
可以先使用辅助扫描模块测试 use auxiliary/scanner/smb/smb_ms17_010
利用辅助模块扫描结果发现只需要配置rhosts这个参数 就是你即将扫描的网段 如果只有一个主机需要扫描 只给出这个主机ip就ok
接着只用设置IP地址和攻击就好了
下图扫描结果显示很容易受到ms17-010的攻击
如果结果中出现加号开头的就说明那个主机存在该漏洞
绑定靶机和主机 并设置payload 建立TCP连接
1:永恒之蓝成功覆盖
2:目标主机和攻击机建立了了一个shell连接,会话为session 1
3:拿到shell
4:在meterpreter会话下输入ps就能获得目标主机的当前进程
Meterpreter > webcam list
我们没有发现摄像头 尝试使用mimikatz获取密码 (tspkg 和wdigest获取密码更暴力)