12.07.2015 Views

w3af Guide de l'Utilisateur - Exploit Database

w3af Guide de l'Utilisateur - Exploit Database

w3af Guide de l'Utilisateur - Exploit Database

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Please wait some seconds while <strong>w3af</strong> performs an extrusion scan.ExtrusionServer listening on interface: eth1Finished extrusion scan.The remote host: "172.10.10.1" can connect to <strong>w3af</strong> with theseports:- 25/TCP- 80/TCP- 53/TCP- 1433/TCP- 8080/TCP- 53/UDP- 69/UDP- 139/UDP- 1025/UDPThe following ports are not bound to a local process and can beused by <strong>w3af</strong>:- 25/TCP- 53/TCP- 1433/TCP- 8080/TCPSelecting port "8080/TCP" for inbound connections from thecompromised server to <strong>w3af</strong>.Et si on jete un oeil à l'interface web Metasploit, nous allons découvrirquelquechose <strong>de</strong> bien plus intéressant:[*] Started reverse handler[*] The remote IP address is: 172.16.1.128[*] Using remote IP address to create payloads.[*] Sent payload to vdaemon.[*] The estimated time to wait for the extrusion scan tocomplete is: 1 seconds.[*] Done waiting![*] The estimated time to wait for PE/ELF transfer is: 8seconds.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!