1 / 2

Metasploit ( Autopwn )

Metasploit ( Autopwn ). LAN. 1. 開啟 Metaexploit. 2. 建立虛擬 DB. 1. 7. 3. 掃描受害者並紀錄開啟的 Port ( nmap ). Linux. SP3. 1. 3. 1. 2. 弱點 1. 2. Metaexploit. 弱點 2. 4. 針對 DB 紀錄的 port ,利用 現有漏洞 , 一個一個去試. 2. 3. 4. 4. 6. 4.b. 4.a. 5. 6. 6. 5. 5.Exploit 成功, Attacker 與 Victim 建立 Session.

beau-berry
Download Presentation

Metasploit ( Autopwn )

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Metasploit(Autopwn) LAN 1.開啟Metaexploit 2.建立虛擬DB 1 7. 3.掃描受害者並紀錄開啟的Port (nmap) Linux SP3 1 3. 1. 2. 弱點1 2 . .. Metaexploit . .. 弱點2 4. 針對DB紀錄的port,利用現有漏洞,一個一個去試 2 3 4 4 6 4.b 4.a 5 6 6. 5. 5.Exploit成功,Attacker與Victim建立Session Attacker Victim 6.查看Session且使用Session進行連入受害者 3 7.進入受害者後的操作 (未完成) 4

  2. Metasploit(Autopwn) • 目前進度 • 已完成 • Metasploit 指令的檢查點 (1~3) • 文件: 簡介、目的、方法、配置 • 未完成 • 具有弱點的受害者 • 連入後的操作情境 • 預計做上傳檔案與破解密碼 • 文件: 原理、步驟(已完成70%)

More Related