Using ms08_067 penetration of XP
1, Project requirements
Penetrate into XP systemExecute several commands in the system
2, Project implementation
1. Implementation objectives
Use the tool to find the target memory live hostUse tools to judge its operating system and collect relevant informationScan the vulnerability of the system and r ...
Posted by cybaf on Thu, 03 Mar 2022 14:50:35 +0100
Active information collection features:
Direct interactive communication with the target system can not avoid leaving traces of accessBe prepared to be blocked:
Detection using a controlled third-party computerUsing agents or controlled hostsUse noise to confuse the target and drown the real detection flow Scanning: send different probe ...
Posted by douga on Tue, 08 Feb 2022 19:42:12 +0100
This paper introduces in detail how to use Metasploit to create attack payload (using attack payload generator msfvenom), and how to avoid killing and shell the attack payload, so as to break through the anti-virus software
1, Avoid killing
No killing literally means to avoid being killed. To be precise, when the created atta ...
Posted by jaydeesmalls on Wed, 02 Feb 2022 17:46:14 +0100
Solemnly declare: This note is only prepared for the purpose of improving safety knowledge and sharing safety knowledge with more people. Do not use the technology in the note for illegal activities. The consequences caused by using the technology in the note have nothing to do with the author himself. It is everyone's responsibility to maintai ...
Posted by stickynote427 on Thu, 27 Jan 2022 01:20:21 +0100
Posted by robshanks on Sat, 01 Jan 2022 17:58:48 +0100