zoukankan      html  css  js  c++  java
  • Ethical Hacking

    Server Side Attack

    Analysing scan results and exploiting target system.

    Go to the Analysis page and find the target host.

    Scan restult - services:

     Scan resulst - Vulnerabilities:

     Scan result - credentials:

     Try to login the database using the above credentials. 

     Scan result - Notes.

     Scan rersults - File shares.

    Scan result - Modules.

     Try to expolit the target machine using module 1.

     Create a session sucessfully.

     Go to the sessions tab.

     Available actions include: collect system data, access filesystem, command shell, create proxy pivot, terminate session.

     Filesystem:

    Webshell:

    相信未来 - 该面对的绝不逃避,该执著的永不怨悔,该舍弃的不再留念,该珍惜的好好把握。
  • 相关阅读:
    从Python到Web开发
    源码安装缺少configure文件
    5
    4
    3
    2
    42
    1
    18
    41
  • 原文地址:https://www.cnblogs.com/keepmoving1113/p/12115004.html
Copyright © 2011-2022 走看看