Hi friends today I teach you how to hack your friends(target) some easy step and some exploit lets start
step 1:-information gathering
use ping command lets image it was target online/offline and information to target ip add
ster2:-port scanning
Use to many port scanner software like nmap,superscane like this
Step3:-Os Fingerprinting
target use opreting system use like windows ,mac os x,linux,ubuntu,redhat,
you can find out target use oprating system using some tool nmap ,net scan tool,pof sowfter tool
step4:-Banner grabbing
Banner grabbing is an attack designed to deduce the brand and/or version of an operating system
or application. Mean after port scanning we found open port 80 (apache) and target os is Linux,
but we don’t know what is version of apache for remote hacking. Like apache 2.0, 2.2, or 2.6 .
step5:-vulnerability assessment
A vulnerability assessment is the process of identifying, quantifying, and prioritizing (or
ranking) the vulnerabilities in a system.
step6:-search & build exploit
http://www.packetstormsecurity.org/
you can find out exploit code free and easy downlode
step7:-attack
Launch attack on remote system and get reverse shell.
step 1:-information gathering
use ping command lets image it was target online/offline and information to target ip add
ster2:-port scanning
Use to many port scanner software like nmap,superscane like this
Step3:-Os Fingerprinting
target use opreting system use like windows ,mac os x,linux,ubuntu,redhat,
you can find out target use oprating system using some tool nmap ,net scan tool,pof sowfter tool
step4:-Banner grabbing
Banner grabbing is an attack designed to deduce the brand and/or version of an operating system
or application. Mean after port scanning we found open port 80 (apache) and target os is Linux,
but we don’t know what is version of apache for remote hacking. Like apache 2.0, 2.2, or 2.6 .
step5:-vulnerability assessment
A vulnerability assessment is the process of identifying, quantifying, and prioritizing (or
ranking) the vulnerabilities in a system.
step6:-search & build exploit
http://www.packetstormsecurity.org/
you can find out exploit code free and easy downlode
step7:-attack
Launch attack on remote system and get reverse shell.
No comments:
Post a Comment