Last active
May 18, 2016 05:04
-
-
Save frontend-3/96135770c291b1b5b3f9dad25e5fe5b8 to your computer and use it in GitHub Desktop.
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
1. Descargar open ssh https://github.com/PowerShell/Win32-OpenSSH/releases/download/5_15_2016/OpenSSH-Win32.zip | |
2. Descomprimir en el disco C:// con el nombre de openSSH | |
3. Instalar growl for windows http://www.growlforwindows.com/gfw/ y ejecutarlo | |
4. Ejecutar power shell como administrador | |
5. Ejecutar el comando "Set-ExecutionPolicy RemoteSigned" | |
6. Ingresa a la carpeta openSSH del disco C. | |
7. Ejecutar el comando "New-NetFirewallRule -Protocol TCP -LocalPort 22 -Direction Inbound -Action Allow -DisplayName SSH" | |
8. Ejecutar el comando "cd c:\openSSH" | |
9. Ejecutar el comando "powershell.exe .\install-sshlsa.ps1" | |
10. Ejecutar el comando "powershell.exe .\install-sshd.ps1" | |
11. Ejecutar servicio ssh-agent y opensshd | |
13. Desactiva el firewall y el antivirus | |
14. Ejecutar comando ssh user@ip | |
15. Ya loqueado ejecutas el comando: growlnotify "Hola te he hackeado" |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment