HELP- Belajar Metasploit
#1
kawan kawan tolongin ane ya, lagi belajar metasploit bener2 dari Nobs. Pas ngutak ngatik coba penes LAN keluar seperti ini

[Image: tanya1.png?w=600&h=375]

pada saat Check exploits keluar :

===== Checking windows/smb/ms06_040_netapi =====

use windows/smb/ms06_040_netapi
msf exploit(ms06_040_netapi) > set RHOST 192.168.1.100
RHOST => 192.168.1.100
msf exploit(ms06_040_netapi) > check
[*] This exploit does not support check.


===== Checking windows/smb/ms08_067_netapi =====

msf exploit(ms06_040_netapi) > use windows/smb/ms08_067_netapi
msf exploit(ms08_067_netapi) > set RHOST 192.168.1.100
RHOST => 192.168.1.100
msf exploit(ms08_067_netapi) > check
[*] This exploit does not support check.


===== Checking windows/smb/ms10_061_spoolss =====

msf exploit(ms08_067_netapi) > use windows/smb/ms10_061_spoolss
msf exploit(ms10_061_spoolss) > set RHOST 192.168.1.100
RHOST => 192.168.1.100
RHOST => 192.168.1.100
msf exploit(ms10_061_spoolss) > check
[*] This exploit does not support check.


===== Checking windows/smb/netidentity_xtierrpcpipe =====

msf exploit(ms10_061_spoolss) > use windows/smb/netidentity_xtierrpcpipe
msf exploit(netidentity_xtierrpcpipe) > set RHOST 192.168.1.100
RHOST => 192.168.1.100
RHOST => 192.168.1.100
msf exploit(netidentity_xtierrpcpipe) > check
[*] This exploit does not support check.


===== Checking windows/smb/timbuktu_plughntcommand_bof =====

msf exploit(netidentity_xtierrpcpipe) > use windows/smb/timbuktu_plughntcommand_bof
msf exploit(timbuktu_plughntcommand_bof) > set RHOST 192.168.1.100
RHOST => 192.168.1.100
msf exploit(timbuktu_plughntcommand_bof) > check
[*] This exploit does not support check.
===================================================================================================================

kira2 apa y artinya, apakah vicktim memiliki vulnerably ? sorry ane bener2 Nobs

Blush

#2
Coba ke sini deh
Klik Here

Coba apa yg kurang

udah open TCP port nya blum ?
mungkin disitu

#3
(04-15-2011, 11:15 AM)devilnay Wrote: Coba ke sini deh
Klik Here

Coba apa yg kurang

udah open TCP port nya blum ?
mungkin disitu


waduh ane masih blm ngerti Open TCP Port, apaan tuh!! tp ane udah udah klik Attacks=>Find Attacks=>By Port

apakah itu yg di maksut?

Ane ke TKP dulu coba implementasikan dulu ajaran kk zee eichel Undecided


#4
(04-15-2011, 04:58 PM)milootwo Wrote:
(04-15-2011, 11:15 AM)devilnay Wrote: Coba ke sini deh
Klik Here

Coba apa yg kurang

udah open TCP port nya blum ?
mungkin disitu


waduh ane masih blm ngerti Open TCP Port, apaan tuh!! tp ane udah udah klik Attacks=>Find Attacks=>By Port

apakah itu yg di maksut?

Ane ke TKP dulu coba implementasikan dulu ajaran kk zee eichel Undecided

auxilary => scanner => portscan => tcp

port di isikan bisa manual … cth : 80 , 25, 43, 45

itu ^^

#5
ya bro port bisa di isikan secara manual... dan perbiasakan melakukan scan terhadap victim agar kita tau port-port yang di perkirakan terbuka ...
FOLLOW @DutaLinux
for more question and sharing about security and Opensource only






Users browsing this thread: 1 Guest(s)