当前位置:网站首页>Cve-2019-0708 vulnerability exploitation of secondary vocational network security 2022 national competition
Cve-2019-0708 vulnerability exploitation of secondary vocational network security 2022 national competition
2022-04-23 10:30:00 【Ba1_ Ma0】
brief introduction
I made a simple environment to reproduce this vulnerability , If you need virtual machine environment, you can add me qq:3316735898, If you don't know anything, you can also ask me
1. Via local PC Medium penetration test platform Kali For the target scene Server1 Conduct system service and version scanning penetration test , With xml Format to output information to the specified file ( Using tools Nmap), Will be with xml Format the parameters that must be used to output information to the specified file as Flag Value submission
nmap Output scanned content to .xml The parameters of the file are
-oX // (XML Output ) Write the output directly to filespec designated xml file , Got xml Files can be created by the browser , Or other programming languages ,Java,python To analyze .XML The output references a XSL Style sheets , Used to format the output, which is similar to HTML You can use the browser to preview
2. In the local PC Penetration test platform Kali in , Use the command to initialize MSF Database and use this command as Flag Value submission
start-up postgresql database
service postgresql start
initialization msfconsole The order is
msfdb init
3. In the local PC Penetration test platform Kali in , open MSF, Use db_import Import the scan results into the database , And view the imported data , Use the command to view the data as Flag Value submission
Import :
db_import /home/kali/test1.xml
View the data :
hosts
4. stay MSF In tools search The command to search CVE-2019-0708 Exploit module , Take the vulnerability disclosure time in the echo result as Flag value ( Such as :2017-10-16) Submit
Search for exploit modules
search 2019_0708
Time is :
2019-5-14
5. stay MSF Call in tools CVE-2019-0708 Vulnerability attack module , And detect whether there are loopholes in the target , Take the last word in the echo result as Flag Value submission
Using modules
use auxiliary/scanner/rdp/cve_2019_0708_bluekeep
Set the target IP
set rhosts 192.168.0.102
perform
run
The last word in the echo result is :
completed
summary
If you don't understand anything, you can ask me , This is the environment I built myself , You can call me if you need
版权声明
本文为[Ba1_ Ma0]所创,转载请带上原文链接,感谢
https://yzsam.com/2022/04/202204231007387661.html
边栏推荐
- Zhengda international explains what the Dow Jones industrial index is?
- MapReduce compression
- C#和数据库连接中类的问题
- 454、四数之和(哈希表)
- 【leetcode】102.二叉树的层序遍历
- SQL Server 游标循环表数据
- 精彩回顾 | DEEPNOVA x Iceberg Meetup Online《基于Iceberg打造实时数据湖》
- Chapter 2 Oracle database in memory architecture (I) (im-2.1)
- 59. Spiral matrix (array)
- JUC concurrent programming 06 -- in-depth analysis of AQS source code of queue synchronizer
猜你喜欢
Sim Api User Guide(6)
Yarn resource scheduler
【leetcode】107.二叉树的层序遍历II
Juc并发编程06——深入剖析队列同步器AQS源码
解决方案架构师的小锦囊 - 架构图的 5 种类型
SQL Server 游标循环表数据
[provincial election joint examination 2022 d2t1] card (state compression DP, FWT convolution)
Yarn core parameter configuration
Solve the problem of installing VMware after uninstalling
Detailed explanation of MapReduce calculation process
随机推荐
2022 mobile crane driver test question bank simulation test platform operation
LeetCode-608. Tree node
What if Jerry's function to locate the corresponding address is not accurate sometimes? [chapter]
Shell script interaction free
Sim Api User Guide(7)
707. Design linked list (linked list)
[untitled]
一文看懂 LSTM(Long Short-Term Memory)
How does the swagger2 interface import postman
Sim Api User Guide(4)
Detailed explanation of MapReduce calculation process
精彩回顾 | DEEPNOVA x Iceberg Meetup Online《基于Iceberg打造实时数据湖》
MapReduce compression
SQLServer 查询数据库死锁
101. Symmetric Tree
Jerry's factors that usually affect CPU performance test results are: [article]
MySql常用语句
IDEA——》每次启动都会Indexing或 scanning files to index
Example of pop-up task progress bar function based on pyqt5
Realizing data value through streaming data integration (4) - streaming data pipeline