Hey there. Nice website this is. I’m new to pentest and this kind of things but i want to learn. Please have some mercy and patience!
I have a question regarding ports when i try to hack a remote pc (by sending and .exe for example). At the moment im creating they payload when it asks me for a port (let say my lport) do i have to use any port that i like? or is it that each exploit has its own specific port to be used? another question is… do i need to scan the victim ports too?
Let’s say i want to use ARCANUS exploit wich from what i read here it uses port 4444. Do i have to have that port opened? Can i use another? And what about the victim, does he need to have that port opened too? What happens if when i scan the victim i see no opened ports? (sometimes some figure as filtered) can i do it anyways?
I managed to get a session from myself with some exploits using virtual machine and it worked most of the time. i just want to try it outside
If you already read till here, thanks very very much!
You must be logged in to reply to this topic.