O'Reilly logo

Kali Linux Intrusion and Exploitation Cookbook by Ishan Girdhar, Dhruv Shah

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Exploiting vulnerable services (Windows)

In this recipe, we will exploit vulnerable services in Windows. To understand this section, we have a Windows 7 system with some vulnerable software running. We will do a quick enumeration, find vulnerabilities, and exploit them using Metasploit.

Getting ready

In order to start exploiting, we will need the vulnerable Windows OS. Get the IP of that machine. Apart from this, we will have to initialize the Metasploit framework in the CLI (command-line interface). We are good to go.

How to do it...

  1. Once the Windows 7 image has been downloaded, run an nmap scan to find the available services. Run the following command in the terminal:
    nmap -sT -sV -T4 -p 1-65535  <IP address>
    

    The output will be as shown in the following ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required