其他分享
首页 > 其他分享> > Ethical Hacking - GAINING ACCESS(6)

Ethical Hacking - GAINING ACCESS(6)

作者:互联网

Server Side Attack

Analysing scan results and exploiting target system.

Go to the Analysis page and find the target host.

 

Scan restult - services:

 

 Scan resulst - Vulnerabilities:

 

 Scan result - credentials:

 

 Try to login the database using the above credentials. 

 

 Scan result - Notes.

 

 Scan rersults - File shares.

 

Scan result - Modules.

 

 Try to expolit the target machine using module 1.

 

 

 Create a session sucessfully.

 

 Go to the sessions tab.

 

 Available actions include: collect system data, access filesystem, command shell, create proxy pivot, terminate session.

 

 Filesystem:

 

 

Webshell:

 

标签:GAINING,Ethical,target,Scan,system,session,result,using,Hacking
来源: https://www.cnblogs.com/keepmoving1113/p/12115004.html