WINDOWS XP - REMOTE NETWORK INFORMATION
- Layout for this exercise:
- Once the system have been exploited, several post
explotaition actions can be performed. For instance, learning remotely about
network characteristics
like IP, subnet mask and default gateway:
- netstat
command informs about established connections with the victim:
- The
information achieved by the attacker is identical as is the same
information would have been got at the victim's machine:
- Of
course, running netstat on the attacker's machines output
symmetric information:
- Also,
the routing table of the victim can be printed: