Selasa, 11 September 2012

EXPLOIT BIGANT SERVER USING EXPLOITDB

1. First connect to Guest Os and run bigant server










2. And then try to get information with scanning ip target, i use nmap to scanning ip target

#nmap -v -A -p1-65535 192.168.43.128

information :
-v: Increase verbosity level

-A: Enable OS detection, version detection, script scanning, and traceroute
-p <port ranges>: Only scan specified ports
in this case i use port range between 1 until 65535





















From information gathering i get some information  including os, version, service running and ports was discovered

3. Open exploitdb and type in console to search exploit code
# ./searchsploit bigant
















view picture above, there are many exploit code. I try to use the latest version that v2.52


4. I tried to chose and view exploit code, type cat directory location of exploit code file





















copy-paste that code and save using extension congenital on directory anywhere up to you


5. Run that file to attack ip target. The command is usually contained in the information when we view the contents of the file at last (no.4)













6. Finish









CMIIW

























Tidak ada komentar:

Posting Komentar