09-04-2014, 01:20 AM
|
عضو مميز
|
|
تاريخ التسجيل: Jul 2014
المشاركات: 6,723
|
|
[استفسار] : شباب ممكن مساعدة مع ده أوامر
سلام وعليكم شباب أتمنى تكونوا بألف خير
أما
بعد أنا خلص التانوية والحمد الله وبدي
أصير خبير في أمن المعلومات
يعني رح أدهب للجامعة وتخصص في أمن المعلوميات وسبل حماية وكده شي
لدا أنا في صيف صيف أبدا أدرس شعبة لي رح أقراها في موسم دراسي عشان أتوفق في دراستي في جامعة
ولذا أنا حملت توزيعة كالي لينكس لختبار إختراق
عشان أفهم سبل إختراق لي تكون عندي دراية واسعة في ده مجال يعني
فكما يقولن لكي تفوز في المعركة يجب أن تعرف خصمك جيدا
وكل ده كلام عشان أقلكم أنا مش هاكر
فأنا طرحت في منتدى سابق بعض تسائلات في ده مجال فواجهوني بإغلاق الحساب
لذا قررت أشرح لكم قبل لبلش
أنا مش هاكر أنا طالب للعلم
ومشكلتي أنني بدرس ده دروس بإنجليزية وده مشكلة فأنا متفوق في لغة كلام يعني لغة سطحية لعامة
المجتمع
مش لغة العلمية
يعني لغة التي في كتب دراسة
أما تسائلاتي
فهي حول بعض أوامر في أذات إختبار إختراق
وسمها
رمز Code:
Metasploit Framework
أنا بتكلم عن ده أوامر
رمز Code:
edit
The edit command will edit the current module with $VISUAL or $EDITOR. By default this will open the current module in Vim.
رمز Code:
msf exploit(ms10_061_spoolss) > edit[*] Launching /usr/bin/vim /usr/share/metasploit-framework/modules/exploits/windows/smb/ms10_061_spoolss.rb
##
# This module requires Metasploit: http//metasploit.com/download
# Current source: https://github.com/rapid7/metasploit-framework
##
require 'msf/core'
require 'msf/windows_error'
class Metasploit3 < Msf::Exploit::Remote
Rank = ExcellentRanking
include Msf::Exploit::Remote::DCERPC
include Msf::Exploit::Remote::SMB
include Msf::Exploit::EXE
include Msf::Exploit::WbemExec
def initialize(info = {})
أمر تاني
رمز Code:
jobs
Jobs are modules that are running in the background. The jobs command provides the ability to list and terminate these jobs.
رمز Code:
msf > jobs -h
Usage: jobs [options]
Active job manipulation and interaction.
OPTIONS:
-K Terminate all running jobs.
-h Help banner.
-i Lists detailed information about a running job.
-k Terminate the specified job name.
-l List all running jobs.
-v Print more detailed info. Use with -i and -l
msf >
أمر تالت
رمز Code:
load
The load command loads a plugin from Metasploit's plugin directory. Arguments are passed as key=val on the shell.
رمز Code:
msf > load
Usage: load [var=val var=val ...]
Loads a plugin from the supplied path. If path is not absolute, first looks
in the user's plugin directory (/root/.msf4/plugins) then
in the framework root plugin directory (/usr/share/metasploit-framework/plugins).
The optional var=val options are custom parameters that can be passed to plugins.
msf > load pcap_log[*] PcapLog plugin loaded.[*] Successfully loaded plugin: pcap_log
أمر رابع
رمز Code:
resource
The resource command runs resource (batch) files that can be loaded through msfconsole.
رمز Code:
msf > resource
Usage: resource path1 [path2 ...]
Run the commands stored in the supplied files. Resource files may also contain
ruby code between tags.
See also: makerc
رمز Code:
Some attacks such as Karmetasploit use resource files to run a set of commands in a karma.rc file to create an attack. Later on we will discuss how, outside of Karmetasploit, that can be very useful.
رمز Code:
msf > resource karma.rc[*] Processing karma.rc for ERB directives.
resource (karma.rc)> db_connect msf3:PASSWORD@127.0.0.1:7175/msf3
resource (karma.rc)> use auxiliary/server/browser_autopwn
...snip...
رمز Code:
Batch files can greatly speed up testing and development times as well as allow the user to automate many tasks. Besides loading a batch file from within msfconsole, they can also be passed at startup using the '-r' flag. The simple example below creates a batch file to display the Metasploit version number at startup.
رمز Code:
root@kali:~# echo version > version.rc
root@kali:~# msfconsole -r version.rc
_ _
/ \ /\ __ _ __ /_/ __
| |\ / | _____ \ \ ___ _____ | | / \ _ \ \
| | \/| | | ___\ |- -| /\ / __\ | -__/ | || | || | |- -|
|_| | | | _|__ | |_ / -\ __\ \ | | | | \__/| | | |_
|/ |____/ \___\/ /\ \\___/ \/ \__| |_\ \___\
Frustrated with proxy pivoting? Upgrade to layer-2 VPN pivoting with
Metasploit Pro -- type 'go_pro' to launch it now.
=[ metasploit v4.8.2-2014021901 [core:4.8 api:1.0] ]
+ -- --=[ 1265 exploits - 695 auxiliary - 202 post ]
+ -- --=[ 330 payloads - 32 encoders - 8 nops ][*] Processing version.rc for ERB directives.
resource (version.rc)> version
Framework: 4.8.2-2014022601
Console : 4.8.2-2014022601.15168
msf >
أمر الخامس
رمز Code:
route
The "route" command in Metasploit allows you to route sockets through a session or 'comm', providing basic pivoting capabilities. To add a route, you pass the target subnet and network mask followed by the session (comm) number.
رمز Code:
meterpreter > route -h
Usage: route [-h] command [args]
Display or modify the routing table on the remote machine.
Supported commands:
add [subnet] [netmask] [gateway]
delete [subnet] [netmask] [gateway]
list
meterpreter >
meterpreter > route
Network routes
==============
Subnet Netmask Gateway
------ ------- -------
0.0.0.0 0.0.0.0 172.16.1.254
127.0.0.0 255.0.0.0 127.0.0.1
172.16.1.0 255.255.255.0 172.16.1.100
172.16.1.100 255.255.255.255 127.0.0.1
172.16.255.255 255.255.255.255 172.16.1.100
224.0.0.0 240.0.0.0 172.16.1.100
255.255.255.255 255.255.255.255 172.16.1.100
أمر سادس
رمز Code:
sessions
The 'sessions' command allows you to list, interact with, and kill spawned sessions. The sessions can be shells, Meterpreter sessions, VNC, etc.
رمز Code:
msf > sessions -h
Usage: sessions [options]
Active session manipulation and interaction.
OPTIONS:
-K Terminate all sessions
-c Run a command on the session given with -i, or all
-d Detach an interactive session
-h Help banner
-i Interact with the supplied session ID
-k Terminate session
-l List all active sessions
-q Quiet mode
-r Reset the ring buffer for the session given with -i, or all
-s Run a script on the session given with -i, or all
-u Upgrade a win32 shell to a meterpreter session
-v List verbose fields
رمز Code:
To list any active sessions, pass the '-l' options to 'sessions'.
رمز Code:
msf exploit(3proxy) > sessions -l
Active sessions
===============
Id Description Tunnel
-- ----------- ------
1 Command shell 192.168.1.101:33191 -> 192.168.1.104:4444
رمز Code:
To interact with a given session, you just need to use the '-i' switch followed by the Id number of the session.
رمز Code:
msf exploit(3proxy) > sessions -i 1[*] Starting interaction with 1...
C:\WINDOWS\system32>
وأخيرا
دمتم برعاية الله وحفضه ساعد في نشر والارتقاء بنا عبر مشاركة رأيك في الفيس بوك
|