#tekrar et -1

Active Reconnaissance


Kaynak: https://tryhackme.com/room/activerecon

images/137-1.png
images/137-2.png

images/137-3.png
images/137-4.png

images/137-5.png
images/137-6.png
images/137-7.png
images/137-8.png

images/137-9.png
images/137-10.png
images/137-11.png

images/137-12.png
images/137-13.png
images/137-14.png

images/137-15.png
images/137-16.png

images/137-17.png

images/137-18.png
images/137-19.png

#tekrar et-3 (17 haziran 2022)

images/137-20.png

images/137-21.png

images/137-22.png nmap -sV --script vuln 10.10.247.173

images/137-23.png
images/137-24.png

kaynak: https://null-byte.wonderhowto.com/how-to/exploit-eternalblue-windows-server-with-metasploit-0195413/

images/137-25.png
images/137-26.png
images/137-27.png
images/137-28.png
images/137-29.png
images/137-30.png

images/137-31.png
images/137-32.png
images/137-33.png