First step find the information gathering from target, here i'm using nmap.
Then I scan the network to get information from target
Second step, doing service enumeration, here I also using nmap to see opened ports
typing the command on terminal like bellow :
root@bt:~# nmap -p1-8000 192.168.56.101
In the process above i scan port with range 1 - 8000
The next step is the vulnerability asessment
Now, open the exploitDB tool and look for BigAnt applications , BigAnt is an application that runs at Windows XP (the target), this would make it easier for us in the process of exploitation.
Type the command : ./searchsploit bigant windows remote
here can be compared to already know the version of BigAnt (BigAnt Server 2.52 SEH (0day))
Then see the file 10765.py on windows/remote/10765.py to geting information and command for exploit
type command : cat platforms/windows/remote/10765.py
OK, we have opened the file and we found the command to exploit
The next step is exploit !!!
Go to the directory the file first and then start the exploit..
Use python command because file extension is (py) : python 10765.py 192.168.56.101 6666
Exploit has been successfully sent, and now we connecting to remote host on port 4444
Done.
No comments:
Post a Comment