本篇文章主要是演示通用模块的安装及使用。
0x01 MS17010通用模块攻击
模块地址
- https://github.com/RiskSense-Ops/metasploit-framework/blob/6c2d5b1fc23ede746081e82f0843e36609e28731/modules/auxiliary/admin/smb/ms17_010_command.rb
- https://github.com/RiskSense-Ops/metasploit-framework/blob/6c2d5b1fc23ede746081e82f0843e36609e28731/modules/exploits/windows/smb/ms17_010_psexec.rb
模块说明手册
- https://github.com/RiskSense-Ops/metasploit-framework/blob/92915ebb6991ea598582bb25a288b94ecdb654f3/documentation/modules/auxiliary/admin/smb/ms17_010_command.md
- https://github.com/RiskSense-Ops/metasploit-framework/blob/9b7c19db087e7202f6e5d64ce2f1ab5168e837cf/documentation/modules/auxiliary/admin/smb/ms17_010_psexec.md
MS17-010 Windows SMB 远程命令和代码执行模块适用于所有易受到攻击的 目标系统:Windows 2000 到 2016(当然还有家庭版本/工作站)。
支持系统列表:
- Windows 2000 SP0 x86
- Windows 2000 Professional SP4 x86
- Windows 2000 Advanced Server SP4 x86
- Windows XP SP0 x86
- Windows XP SP1 x86
- Windows XP SP2 x86
- Windows XP SP3 x86
- Windows XP SP2 x64
- Windows Server 2003 Enterprise SP 2 x86
- Windows Vista Home Premium x86
- Windows 7 x86
- Windows 7 Ultimate SP1 x86
- Windows 7 Enterprise SP1 x86
- Windows 7 SP0 x64
- Windows 7 SP1 x64
- Windows Server 2008 R2 x64
- Windows Server 2008 R2 SP1 x64
- Windows 8 x86
- Windows 8 x64
- Windows Server 2012 x64
- Windows 8.1 Enterprise Evaluation 9600 x86
- Windows 8.1 SP1 x86
- Windows 8.1 x64
- Windows 8.1 SP1 x64
- Windows Server 2012 R2 x86
- Windows Server 2012 R2 Standard 9600 x64
- Windows Server 2012 R2 SP1 x64
- Windows 10 10.10586 x86
- Windows 10 10.10586 x64
- Windows Server 2016 10.10586 x64
- Windows 10 10.0.14393 x86
- Windows 10 Enterprise Evaluation 10.14393 x64
- Windows Server 2016 Data Center 10.14393 x64