منتدى استراحات زايد

منتدى استراحات زايد (http://vb.ma7room.com/index.php)
-   منتدى أخبار المواقع والمنتديات العربية والأجنبية (http://vb.ma7room.com/forumdisplay.php?f=183)
-   -   [استفسار] : شباب ممكن مساعدة مع ده أوامر (http://vb.ma7room.com/showthread.php?t=1578307)

محروم.كوم 09-04-2014 02:40 AM

[استفسار] : شباب ممكن مساعدة مع ده أوامر
 
سلام وعليكم شباب أتمنى تكونوا بألف خير
أما
بعد أنا خلص التانوية والحمد الله وبدي
أصير خبير في أمن المعلومات
يعني رح أدهب للجامعة وتخصص في أمن المعلوميات وسبل حماية وكده شي
لدا أنا في صيف صيف أبدا أدرس شعبة لي رح أقراها في موسم دراسي عشان أتوفق في دراستي في جامعة
ولذا أنا حملت توزيعة كالي لينكس لختبار إختراق
عشان أفهم سبل إختراق لي تكون عندي دراية واسعة في ده مجال يعني
فكما يقولن لكي تفوز في المعركة يجب أن تعرف خصمك جيدا
وكل ده كلام عشان أقلكم أنا مش هاكر
فأنا طرحت في منتدى سابق بعض تسائلات في ده مجال فواجهوني بإغلاق الحساب
لذا قررت أشرح لكم قبل لبلش
أنا مش هاكر أنا طالب للعلم
ومشكلتي أنني بدرس ده دروس بإنجليزية وده مشكلة فأنا متفوق في لغة كلام يعني لغة سطحية لعامة
المجتمع
مش لغة العلمية
يعني لغة التي في كتب دراسة
أما تسائلاتي
فهي حول بعض أوامر في أذات إختبار إختراق
وسمها
رمز Code:
Metasploit Framework
أنا بتكلم عن ده أوامر

رمز Code:
edit

The edit command will edit the current module with $VISUAL or $EDITOR. By default this will open the current module in Vim.
رمز Code:
msf exploit(ms10_061_spoolss) > edit[*] Launching /usr/bin/vim /usr/share/metasploit-framework/modules/exploits/windows/smb/ms10_061_spoolss.rb

##
# This module requires Metasploit: http//metasploit.com/download
# Current source: https://github.com/rapid7/metasploit-framework
##

require 'msf/core'
require 'msf/windows_error'

class Metasploit3 < Msf::Exploit::Remote
Rank = ExcellentRanking

include Msf::Exploit::Remote::DCERPC
include Msf::Exploit::Remote::SMB
include Msf::Exploit::EXE
include Msf::Exploit::WbemExec

def initialize(info = {})
أمر تاني
رمز Code:
jobs

Jobs are modules that are running in the background. The jobs command provides the ability to list and terminate these jobs.
رمز Code:
msf > jobs -h
Usage: jobs [options]

Active job manipulation and interaction.

OPTIONS:

-K Terminate all running jobs.
-h Help banner.
-i Lists detailed information about a running job.
-k Terminate the specified job name.
-l List all running jobs.
-v Print more detailed info. Use with -i and -l

msf >
أمر تالت
رمز Code:
load




The load command loads a plugin from Metasploit's plugin directory. Arguments are passed as key=val on the shell.
رمز Code:
msf > load
Usage: load [var=val var=val ...]

Loads a plugin from the supplied path. If path is not absolute, first looks
in the user's plugin directory (/root/.msf4/plugins) then
in the framework root plugin directory (/usr/share/metasploit-framework/plugins).
The optional var=val options are custom parameters that can be passed to plugins.

msf > load pcap_log[*] PcapLog plugin loaded.[*] Successfully loaded plugin: pcap_log
أمر رابع


رمز Code:
resource

The resource command runs resource (batch) files that can be loaded through msfconsole.
رمز Code:
msf > resource
Usage: resource path1 [path2 ...]

Run the commands stored in the supplied files. Resource files may also contain
ruby code between tags.

See also: makerc
رمز Code:
Some attacks such as Karmetasploit use resource files to run a set of commands in a karma.rc file to create an attack. Later on we will discuss how, outside of Karmetasploit, that can be very useful.
رمز Code:
msf > resource karma.rc[*] Processing karma.rc for ERB directives.
resource (karma.rc)> db_connect msf3:[email protected]:7175/msf3
resource (karma.rc)> use auxiliary/server/browser_autopwn
...snip...
رمز Code:
Batch files can greatly speed up testing and development times as well as allow the user to automate many tasks. Besides loading a batch file from within msfconsole, they can also be passed at startup using the '-r' flag. The simple example below creates a batch file to display the Metasploit version number at startup.
رمز Code:
root@kali:~# echo version > version.rc
root@kali:~# msfconsole -r version.rc


_ _
/ \ /\ __ _ __ /_/ __
| |\ / | _____ \ \ ___ _____ | | / \ _ \ \
| | \/| | | ___\ |- -| /\ / __\ | -__/ | || | || | |- -|
|_| | | | _|__ | |_ / -\ __\ \ | | | | \__/| | | |_
|/ |____/ \___\/ /\ \\___/ \/ \__| |_\ \___\


Frustrated with proxy pivoting? Upgrade to layer-2 VPN pivoting with
Metasploit Pro -- type 'go_pro' to launch it now.

=[ metasploit v4.8.2-2014021901 [core:4.8 api:1.0] ]
+ -- --=[ 1265 exploits - 695 auxiliary - 202 post ]
+ -- --=[ 330 payloads - 32 encoders - 8 nops ][*] Processing version.rc for ERB directives.
resource (version.rc)> version
Framework: 4.8.2-2014022601
Console : 4.8.2-2014022601.15168
msf >
أمر الخامس
رمز Code:
route

The "route" command in Metasploit allows you to route sockets through a session or 'comm', providing basic pivoting capabilities. To add a route, you pass the target subnet and network mask followed by the session (comm) number.
رمز Code:
meterpreter > route -h
Usage: route [-h] command [args]

Display or modify the routing table on the remote machine.

Supported commands:

add [subnet] [netmask] [gateway]
delete [subnet] [netmask] [gateway]
list

meterpreter >

meterpreter > route

Network routes
==============

Subnet Netmask Gateway
------ ------- -------
0.0.0.0 0.0.0.0 172.16.1.254
127.0.0.0 255.0.0.0 127.0.0.1
172.16.1.0 255.255.255.0 172.16.1.100
172.16.1.100 255.255.255.255 127.0.0.1
172.16.255.255 255.255.255.255 172.16.1.100
224.0.0.0 240.0.0.0 172.16.1.100
255.255.255.255 255.255.255.255 172.16.1.100
أمر سادس
رمز Code:
sessions

The 'sessions' command allows you to list, interact with, and kill spawned sessions. The sessions can be shells, Meterpreter sessions, VNC, etc.
رمز Code:
msf > sessions -h
Usage: sessions [options]

Active session manipulation and interaction.

OPTIONS:

-K Terminate all sessions
-c Run a command on the session given with -i, or all
-d Detach an interactive session
-h Help banner
-i Interact with the supplied session ID
-k Terminate session
-l List all active sessions
-q Quiet mode
-r Reset the ring buffer for the session given with -i, or all
-s Run a script on the session given with -i, or all
-u Upgrade a win32 shell to a meterpreter session
-v List verbose fields
رمز Code:
To list any active sessions, pass the '-l' options to 'sessions'.
رمز Code:
msf exploit(3proxy) > sessions -l

Active sessions
===============

Id Description Tunnel
-- ----------- ------
1 Command shell 192.168.1.101:33191 -> 192.168.1.104:4444
رمز Code:
To interact with a given session, you just need to use the '-i' switch followed by the Id number of the session.
رمز Code:
msf exploit(3proxy) > sessions -i 1[*] Starting interaction with 1...

C:\WINDOWS\system32>
وأخيرا
دمتم برعاية الله وحفضه


الساعة الآن 07:38 PM

Powered by vBulletin® Copyright ©2000 - 2025, Jelsoft Enterprises Ltd.
Content Relevant URLs by vBSEO 3.5.2 TranZ By Almuhajir


1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 201 202 203 204 205 206 207 208 209 210 211 212 213 214 215 216 217 218 219 220 221 222 223 224 225 226 227