Penetration Testing on Windows XP SP2/ SP3 by Exploiting a Vulnerability in Windows Samba Service {ms08-67}.
{Requirements:}  ————————  All Machines Running on VM   1. Kali Linux (172.16.66.193)  2. Windows XP SP2 (172.16.66.193)  3. IDS - Suricata   {Scan for open ports:}  ———————————-  root@fikri:~# nmap -n -sV 172.16.66.199   Starting Nmap 6.49BETA4 ( https://nmap.org ) at 2015-12-17 10:25 MYT  Nmap scan report for 172.16.66.199  Host is up (0.11s latency).  Not shown: 918 closed ports, 79 filtered ports  PORT    STATE SERVICE      VERSION  135/tcp open  msrpc        Microsoft Windows RPC  139/tcp open  netbios-ssn  Microsoft Windows 98 netbios-ssn  445/tcp open  microsoft-ds Microsoft Windows XP microsoft-ds  MAC Address: 00:0C:29:D1:55:23 (VMware)  Service Info: OSs: Windows, Windows 98, Windows XP; CPE: cpe:/o:microsoft:windows, cpe:/o:microsoft:windows_98, cpe:/o:microsoft:windows_xp   Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .  Nmap done: 1 ...