Popular Search

Vulnerabilities for Hacking

Using vulnerabilities for Hacking:

First of all we need to know the list of open ports using Port Scanner.

Complete list of ports used by trojan

Suppose we find that port number "1080" is open, we search it in above list of trojan ports.
we find that 1083 is vulnerabilities related to winhole.

How to use this vulnerabilities?
It is much easier than what we have done in port Scanning , now search in google about this 1080 port.

Download Metasploit framework from internet.

To use Metasploit framework you need good tutorial with images.
And one of the best tutorial available about metasploit is Don Parker's .
you can use this framework to hack any system with any vulnerable port open.

0 comments:

Post a Comment

Dhiti