Metasploit - MS17010通用模块
2018-02-01 09:00:00 Author: payloads.online(查看原文) 阅读量:215 收藏

本篇文章主要是演示通用模块的安装及使用。

0x01 MS17010通用模块攻击

模块地址

  • https://github.com/RiskSense-Ops/metasploit-framework/blob/6c2d5b1fc23ede746081e82f0843e36609e28731/modules/auxiliary/admin/smb/ms17_010_command.rb
  • https://github.com/RiskSense-Ops/metasploit-framework/blob/6c2d5b1fc23ede746081e82f0843e36609e28731/modules/exploits/windows/smb/ms17_010_psexec.rb

模块说明手册

  • https://github.com/RiskSense-Ops/metasploit-framework/blob/92915ebb6991ea598582bb25a288b94ecdb654f3/documentation/modules/auxiliary/admin/smb/ms17_010_command.md
  • https://github.com/RiskSense-Ops/metasploit-framework/blob/9b7c19db087e7202f6e5d64ce2f1ab5168e837cf/documentation/modules/auxiliary/admin/smb/ms17_010_psexec.md

MS17-010 Windows SMB 远程命令和代码执行模块适用于所有易受到攻击的 目标系统:Windows 2000 到 2016(当然还有家庭版本/工作站)。

支持系统列表:

  • Windows 2000 SP0 x86
  • Windows 2000 Professional SP4 x86
  • Windows 2000 Advanced Server SP4 x86
  • Windows XP SP0 x86
  • Windows XP SP1 x86
  • Windows XP SP2 x86
  • Windows XP SP3 x86
  • Windows XP SP2 x64
  • Windows Server 2003 Enterprise SP 2 x86
  • Windows Vista Home Premium x86
  • Windows 7 x86
  • Windows 7 Ultimate SP1 x86
  • Windows 7 Enterprise SP1 x86
  • Windows 7 SP0 x64
  • Windows 7 SP1 x64
  • Windows Server 2008 R2 x64
  • Windows Server 2008 R2 SP1 x64
  • Windows 8 x86
  • Windows 8 x64
  • Windows Server 2012 x64
  • Windows 8.1 Enterprise Evaluation 9600 x86
  • Windows 8.1 SP1 x86
  • Windows 8.1 x64
  • Windows 8.1 SP1 x64
  • Windows Server 2012 R2 x86
  • Windows Server 2012 R2 Standard 9600 x64
  • Windows Server 2012 R2 SP1 x64
  • Windows 10 10.10586 x86
  • Windows 10 10.10586 x64
  • Windows Server 2016 10.10586 x64
  • Windows 10 10.0.14393 x86
  • Windows 10 Enterprise Evaluation 10.14393 x64
  • Windows Server 2016 Data Center 10.14393 x64

0x02 模块安装


文章来源: https://payloads.online/archivers/2018-02-01/1
如有侵权请联系:admin#unsafe.sh