Jump to content
YOUR-AD-HERE
HOSTING
TOOLS

Locked Penetration Testing With Metasploit ( BOOK )


sQuo

Recommended Posts

This is the hidden content, please

 

Author: Dinesh Shetty

Organization: Paladion Networks

No. of pages: 16

 

 

SCENARIO :

 

Victim Machine-

OS: Microsoft Windows Server 2003

IP: IP: 192.168.42.129

 

Attacker ( Our ) Machine-

OS: Backtrack 5

Kernel version: Linux bt 2.6.38 #1 SMP Thu Mar 17 20:52:18 EDT 2011 i686 GNU/Linux

Metasploit Version: Built in version of metasploit 3.8.0-dev

IP: 192.168.42.128

 

Objective-

The only information provided to us about the remote server is that it is a Windows 2003 Server and the Objective is to gain shell access of this remote server.

 

This is the hidden content, please

Pass: level-23.biz

Link to comment
Share on other sites

Guest
This topic is now closed to further replies.
×
×
  • Create New...

Important Information

We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.