Forum Replies Created
- AuthorPosts
arminius
ParticipantSo what type of vulnerable services?
All of our office computers are windows OS. Also, where do I download the Metasploitable machine? There was no link provided in the lecture.
arminius
ParticipantThe Third Machine is an Ubuntu system. It is the target computer.
arminius
Participantarminius
ParticipantHey,
Yes I got a working backdoor using the NAT Network. I tried to run the script for pivoting and got this.
arminius
ParticipantSo how do I go about ‘attaching’ the adapter to kali? I am in the process of testing this over the virtual network. Already have my ports forwarded.
arminius
ParticipantAlso, just for information: the target machine is at our main office. I am working from my office, 30 mins away.
arminius
ParticipantHi,
So, the target machine is a remote machine, located on a completely separate network from mine. I am accessing the internet, to get to the target machine.
Does this make any difference? If not, then I set them all to NAT Network?arminius
Participantarminius
ParticipantPerhaps this would help: Screenshot 2
arminius
ParticipantHi Diego,
I found it and it did seem to work.
However, now I’ve got a new issue: Screenshot
I had forwarded the ports 4444 and 139 on my router. Still no effect.
arminius
ParticipantSeems the screenshot didn’t upload properly, so here is a direct link.
arminius
ParticipantHey,
So your suggested actually worked. I gained full access to the virtual machine.
Thanks.
arminius
ParticipantHello,
I used the “go” language. I will try the other options and see how it goes.
arminius
ParticipantHello,
Thanks for replying. Yes I am attacking the virtual machine. I figured it might help figure out what’s wrong.
I have changed them both to NAT Network. It seems to be listening.
However, I now seem to be experiencing a separate issue.
Screenshotarminius
ParticipantIs anybody at least able to give me a tip?
- AuthorPosts