当前位置:网站首页>Cve-2019-0708 vulnerability exploitation of secondary vocational network security 2022 national competition
Cve-2019-0708 vulnerability exploitation of secondary vocational network security 2022 national competition
2022-04-23 10:30:00 【Ba1_ Ma0】
brief introduction
I made a simple environment to reproduce this vulnerability , If you need virtual machine environment, you can add me qq:3316735898, If you don't know anything, you can also ask me

1. Via local PC Medium penetration test platform Kali For the target scene Server1 Conduct system service and version scanning penetration test , With xml Format to output information to the specified file ( Using tools Nmap), Will be with xml Format the parameters that must be used to output information to the specified file as Flag Value submission
nmap Output scanned content to .xml The parameters of the file are
-oX // (XML Output ) Write the output directly to filespec designated xml file , Got xml Files can be created by the browser , Or other programming languages ,Java,python To analyze .XML The output references a XSL Style sheets , Used to format the output, which is similar to HTML You can use the browser to preview


2. In the local PC Penetration test platform Kali in , Use the command to initialize MSF Database and use this command as Flag Value submission
start-up postgresql database
service postgresql start
initialization msfconsole The order is
msfdb init

3. In the local PC Penetration test platform Kali in , open MSF, Use db_import Import the scan results into the database , And view the imported data , Use the command to view the data as Flag Value submission
Import :
db_import /home/kali/test1.xml

View the data :
hosts

4. stay MSF In tools search The command to search CVE-2019-0708 Exploit module , Take the vulnerability disclosure time in the echo result as Flag value ( Such as :2017-10-16) Submit
Search for exploit modules
search 2019_0708

Time is :
2019-5-14
5. stay MSF Call in tools CVE-2019-0708 Vulnerability attack module , And detect whether there are loopholes in the target , Take the last word in the echo result as Flag Value submission
Using modules
use auxiliary/scanner/rdp/cve_2019_0708_bluekeep
Set the target IP
set rhosts 192.168.0.102

perform
run

The last word in the echo result is :
completed
summary
If you don't understand anything, you can ask me , This is the environment I built myself , You can call me if you need
版权声明
本文为[Ba1_ Ma0]所创,转载请带上原文链接,感谢
https://yzsam.com/2022/04/202204231007387661.html
边栏推荐
- 【无标题】
- Exercise questions and simulation test of refrigeration and air conditioning equipment operation test in 2022
- Sim Api User Guide(8)
- Question bank and answers of Shanghai safety officer C certificate examination in 2022
- Xshell+Xftp 下载安装步骤
- Jerry's users how to handle events in the simplest way [chapter]
- Introduction to wechat applet, development history, advantages of applet, application account, development tools, initial knowledge of wxml file and wxss file
- 206. Reverse linked list (linked list)
- ansible 云计算 自动化 命令行精简版
- Turn: Maugham: reading is a portable refuge
猜你喜欢

Question bank and answers of Shanghai safety officer C certificate examination in 2022

Solve the problem of installing VMware after uninstalling

Charles function introduction and use tutorial

/Can etc / shadow be cracked?

【省选联考 2022 D2T1】卡牌(状态压缩 DP,FWT卷积)

Sim Api User Guide(6)

C language - custom type

JUC concurrent programming 07 -- is fair lock really fair (source code analysis)

Operation of 2022 tea artist (primary) test question simulation test platform

0704、ansible----01
随机推荐
Jerry's factors that usually affect CPU performance test results are: [article]
C#和数据库连接中类的问题
Sim Api User Guide(7)
JVM——》常用命令
24、两两交换链表中的节点(链表)
Chapter 3 enable and adjust the size of IM column storage (im-3.1)
454. Sum of four numbers (hash table)
101. Symmetric Tree
[untitled]
Reading integrity monitoring techniques for vision navigation systems - 3 background
707、设计链表(链表)
【leetcode】102.二叉树的层序遍历
209、长度最小的子数组(数组)
/etc/shadow可以破解吗?
209. Subarray with the smallest length (array)
IDEA——》每次启动都会Indexing或 scanning files to index
景联文科技—专业数据标注公司和智能数据标注平台
SSH利用私钥无密钥连接服务器踩坑实录
得到知识服务app原型设计比较与实践
Ansible cloud computing automation command line compact version