You can see about Bigant exploitation here !
Or you can use 10765.py on exploitdb ==> python 10765.py < target ip>
nc <target ip> 4444
1. Dump memory on XP OS
2. Examine using PTK or volatility
Using PTK :
==> First Information
==> Check Connections List
==> AND OTHER CAN SEE WITH CHANGE " Choose analysis type " ==> Start
======================================================================
Using Volatility :
==> Check Conections List
==> Service scan ( svcscan )
root@linux:/pentest/forensics/volatility# ./vol.py -f /var/www/ptk/images/memdump-bigant.mem svcscan
===> Proccess view ( psxview )
========================================================================