jjzjj

Vulnhub之My File Server 2靶机详细测试过程(利用Metasploit实现本地提权相当的爽)

MyFileServer2作者:jasonhuawen靶机信息名称:MyFileServer:2地址:https://www.vulnhub.com/entry/my-file-server-2,442/将上述靶机的虚拟机导入到VirtualBox,并设置网络模式为host-only,与攻击机KaliLinux为同一局域网。识别目标主机IP地址─(kali㉿kali)-[~/Desktop/Vulnhub/MyFileServer2]└─$sudonetdiscover-ieth1-r192.168.56.0/24Currentlyscanning:192.168.56.0/24|Screen
12