you have obtain data required for later stages.
2. Check port with browser example http://192.168.0.112:10000
httpd, mini serve, webmin for exploit.
4. Test webmin wit explitdb for search BruteForch and Arbitary
5. You can see file 2017.pl at /multiple/remote/2017.pl
use #cp platform/multiple/remote/2017.pl for copy file and directory
6. Type #perl 2017.pl for find /etc/passwd
7. Type #cat /etc/passwd for display text file at passwd
8. Type #cat /etc/shadow for display text file at shadow
and we have got /etc/shadow. :))
Tidak ada komentar:
Posting Komentar