1. Informasi Gathering
- Scan IP with nmap --> # 192.168.56.0.24
- IP target --> 192.168.56.101
- Open port --> 22 / 80 / 139 / 445 / 10000
2. Service Enumeration
- written console --> nmap 192.168.56.101
3. Vulnerability
- Open webmin written ---> ./searchsploit webmin
- Next written console --> cat platforms/multiple/remote/2017.pl
- Next written console --> # cd /pentest/exploits/exploitdb/platforms/multiple/remote
4. Exploit
0 komentar:
Posting Komentar