w3af Guide de l'Utilisateur - Exploit Database
w3af Guide de l'Utilisateur - Exploit Database
w3af Guide de l'Utilisateur - Exploit Database
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
Please wait some seconds while <strong>w3af</strong> performs an extrusion scan.ExtrusionServer listening on interface: eth1Finished extrusion scan.The remote host: "172.10.10.1" can connect to <strong>w3af</strong> with theseports:- 25/TCP- 80/TCP- 53/TCP- 1433/TCP- 8080/TCP- 53/UDP- 69/UDP- 139/UDP- 1025/UDPThe following ports are not bound to a local process and can beused by <strong>w3af</strong>:- 25/TCP- 53/TCP- 1433/TCP- 8080/TCPSelecting port "8080/TCP" for inbound connections from thecompromised server to <strong>w3af</strong>.Et si on jete un oeil à l'interface web Metasploit, nous allons découvrirquelquechose <strong>de</strong> bien plus intéressant:[*] Started reverse handler[*] The remote IP address is: 172.16.1.128[*] Using remote IP address to create payloads.[*] Sent payload to vdaemon.[*] The estimated time to wait for the extrusion scan tocomplete is: 1 seconds.[*] Done waiting![*] The estimated time to wait for PE/ELF transfer is: 8seconds.