官术网_书友最值得收藏!

Exploits

When Metasploit starts up, it shows the count of the publicly available exploits that are already available in the framework An exploit can be considered as the piece of code that takes advantage of a vulnerability and gives us the desired output.

To view all the available exploits, we use the following command:

show exploits

The preceding command will show a list of all the available exploits in the Metasploit Framework, along with path, disclosure date, its ranking, and even description. Using the exploit is similar to using an auxiliary. Let's look at an example of an RCE exploit that was found on the HP Data Protector.

Metasploit allows us to search the modules as well, using the following command:

search < module name>  

To use one of the modules, we type the following:

use exploit/windows/misc/hp_dataprotector_cmd_exec 

Once the exploit is loaded, we see the following options:

We set the IP of the RHOST using the set command:

 set RHOST <IP Here>

And then we run it:

Running this exploit requires Metasploit to be run as root, as port 445 is considered a privileged port to which this exploit is bound.
主站蜘蛛池模板: 仁寿县| 广水市| 于田县| 赣州市| 沅江市| 汝南县| 贺州市| 马山县| 卢氏县| 灯塔市| 八宿县| 石狮市| 山西省| 辽源市| 姚安县| 义马市| 大理市| 翁牛特旗| 霸州市| 石门县| 松潘县| 阿克| 乐陵市| 乌恰县| 石嘴山市| 济南市| 渭源县| 平遥县| 南昌市| 瑞昌市| 汝州市| 汨罗市| 曲麻莱县| 安泽县| 连云港市| 武冈市| 太湖县| 新民市| 龙井市| 遵义市| 梧州市|