Remote Exploitation
◾
189
Therefore we would use the –p command to try all the exploits
based upon the open ports
135, 139, and 445. Last but not least, we use the following command to execute the Metasploit
autopwn:
db_autopwn –p –e
In case if Metasploit’s “Autopwn” has successfully managed
to compromise the target, a session
would be created. We can use the “sessions –l” command to display all the active sessions with
the target.
Dostları ilə paylaş: