Enumeration
- Enumerate using nmap
- Try find any way to locate and download the vulnerable application
- From nmap , we will also get open port connected to that vuln app.
- Transfer that vuln app to your testing window machine where you have immunity debugger
Note Before the last step , in linux machine , we will create netcat connection to our testing window machine using its ip address . After successfully doing all steps, At the time of generating reverse shell payload we will use the ip address of the target machine