Rabu, 12 September 2012

Meeting 4 privilege escalation

1. Privilege Escalation , first we scan ip address target, yess we can ip address target this 192.168.56.5 and open port 22

2. open tool exploitDB, we search file tar which will exploit
3. open your information with cat
4.open with python and type result extrak
5. searchploit again, now webadmin
6. and last, open language perl, no ip address , port  /etc/shadow
    /etc/shadow this , storage password collection




Tidak ada komentar:

Posting Komentar