- Hands-On Red Team Tactics
- Himanshu Sharma Harpreet Singh
- 186字
- 2021-08-13 15:36:42
Exploits
When Metasploit starts up, it shows the count of the publicly available exploits that are already available in the framework An exploit can be considered as the piece of code that takes advantage of a vulnerability and gives us the desired output.
To view all the available exploits, we use the following command:
show exploits

The preceding command will show a list of all the available exploits in the Metasploit Framework, along with path, disclosure date, its ranking, and even description. Using the exploit is similar to using an auxiliary. Let's look at an example of an RCE exploit that was found on the HP Data Protector.
Metasploit allows us to search the modules as well, using the following command:
search < module name>

To use one of the modules, we type the following:
use exploit/windows/misc/hp_dataprotector_cmd_exec

Once the exploit is loaded, we see the following options:

We set the IP of the RHOST using the set command:
set RHOST <IP Here>
And then we run it:
- ASP.NET Core 3 框架揭秘(上下冊)
- P2P網絡測量與分析
- Dreamweaver+Flash+Photoshop網頁設計從入門到精通(微課精編版)
- 劍指Vue3:從入門到實踐
- 掌控你的工作?。呵捎肙utlook極速提升工作效率
- Google Plus First Look:a tip-packed,comprehensive look at Google+
- 性能之巔:洞悉系統、企業與云計算
- 數據資產(第2版)
- ASP.NET框架應用程序實戰:軟件開發工程師崗前必備
- 計算機網絡教程(第4版)
- Adobe Dreamweaver 2020基礎培訓教材
- 網絡設備配置與管理實訓教程
- WordPress 3 Cookbook
- 前端技術架構與工程
- 開源云計算:部署、應用、運維