♋...Learn Harder, Keep Humble, Not For The Fain Heart !, Respect Others, Try Harder...♋

Monday, September 10, 2012

Exploit Windows XP SP 3 Using ExploitDB

at the meeting this afternoon we learned to exploit Windows XP SP 3.

First step find the information gathering from target, here i'm using nmap. 
Then I scan the network to get information from target


Second step, doing service enumeration, here I also using nmap to see opened ports
typing the command on terminal like bellow :
root@bt:~# nmap -p1-8000 192.168.56.101


In the process above i scan port with range 1 - 8000

The next step is the vulnerability asessment
Now, open the exploitDB tool and look for BigAnt applications , BigAnt is an application that runs at Windows XP (the target), this would make it easier for us in the process of exploitation.
Type the command : ./searchsploit bigant windows remote



here can be compared to already know the version of BigAnt (BigAnt Server 2.52 SEH (0day))
Then see the file 10765.py on windows/remote/10765.py to geting information and command for exploit
type command : cat platforms/windows/remote/10765.py



OK, we have opened the file and we found the command to exploit

The next step is exploit !!!
Go to the directory the file first and then start the exploit..
Use python command because file extension is (py) : python 10765.py 192.168.56.101 6666


Exploit has been successfully sent, and now we connecting to remote host on port 4444 


Done.






No comments:

Post a Comment