官术网_书友最值得收藏!

Exploits

When Metasploit starts up, it shows the count of the publicly available exploits that are already available in the framework An exploit can be considered as the piece of code that takes advantage of a vulnerability and gives us the desired output.

To view all the available exploits, we use the following command:

show exploits

The preceding command will show a list of all the available exploits in the Metasploit Framework, along with path, disclosure date, its ranking, and even description. Using the exploit is similar to using an auxiliary. Let's look at an example of an RCE exploit that was found on the HP Data Protector.

Metasploit allows us to search the modules as well, using the following command:

search < module name>  

To use one of the modules, we type the following:

use exploit/windows/misc/hp_dataprotector_cmd_exec 

Once the exploit is loaded, we see the following options:

We set the IP of the RHOST using the set command:

 set RHOST <IP Here>

And then we run it:

Running this exploit requires Metasploit to be run as root, as port 445 is considered a privileged port to which this exploit is bound.
主站蜘蛛池模板: 乐清市| 临清市| 南昌县| 望都县| 敦化市| 武安市| 上杭县| 枞阳县| 铜山县| 沙洋县| 安徽省| 浮梁县| 泊头市| 宁河县| 依安县| 黄石市| 四平市| 泽州县| 铜鼓县| 巴彦县| 新宾| 扶沟县| 高阳县| 竹山县| 喀喇| 台前县| 凉城县| 普安县| 江门市| 晋城| 泌阳县| 邯郸县| 邵东县| 五河县| 麻江县| 五峰| 锡林郭勒盟| 广宗县| 泰顺县| 远安县| 青川县|