1. Informasi Gathering
- Scan IP with nmap --> # 192.168.56.0.24
 
- IP target --> 192.168.56.101
 - Open port --> 22 / 80 / 139 / 445 / 10000
 
2. Service Enumeration 
- written console --> nmap 192.168.56.101
 
3. Vulnerability 
- Open webmin written ---> ./searchsploit webmin
 
- Next written console --> cat platforms/multiple/remote/2017.pl
 
- Next written console --> # cd /pentest/exploits/exploitdb/platforms/multiple/remote
 
4. Exploit 



 
0 komentar:
Posting Komentar