Senin, 27 Februari 2012

File exploit and Web exploit

The first computer I had to exploit the first victim, do information gathering and do exploitable 


with file exploit




after that find the module to exploit


after get the module, used at metasploit and setting the set


set again at payload used meterpreter


and exploit


after connect to computer victim, make false application and send to computer victim that can be accessed. make with msfpayload and msfencode




after make the false application, upload the false application to computer victim


and look the result, false application already entered the victim computer

okay, This means I managed to create a backdoor on the victim computer

now, exit the meterpreter, and used multi handler module


and set payload again




set LHOST




set LPORT



and exploit



if victim computer running the false application, my computer automatically connect with victim computer




WEB EXPLOIT







sorry my laptop error at a critical time



Tidak ada komentar:

Posting Komentar