Skip to content

Instantly share code, notes, and snippets.

@frontend-3
Last active May 18, 2016 05:04
Show Gist options
  • Star 0 You must be signed in to star a gist
  • Fork 0 You must be signed in to fork a gist
  • Save frontend-3/96135770c291b1b5b3f9dad25e5fe5b8 to your computer and use it in GitHub Desktop.
Save frontend-3/96135770c291b1b5b3f9dad25e5fe5b8 to your computer and use it in GitHub Desktop.
1. Descargar open ssh https://github.com/PowerShell/Win32-OpenSSH/releases/download/5_15_2016/OpenSSH-Win32.zip
2. Descomprimir en el disco C:// con el nombre de openSSH
3. Instalar growl for windows http://www.growlforwindows.com/gfw/ y ejecutarlo
4. Ejecutar power shell como administrador
5. Ejecutar el comando "Set-ExecutionPolicy RemoteSigned"
6. Ingresa a la carpeta openSSH del disco C.
7. Ejecutar el comando "New-NetFirewallRule -Protocol TCP -LocalPort 22 -Direction Inbound -Action Allow -DisplayName SSH"
8. Ejecutar el comando "cd c:\openSSH"
9. Ejecutar el comando "powershell.exe .\install-sshlsa.ps1"
10. Ejecutar el comando "powershell.exe .\install-sshd.ps1"
11. Ejecutar servicio ssh-agent y opensshd
13. Desactiva el firewall y el antivirus
14. Ejecutar comando ssh user@ip
15. Ya loqueado ejecutas el comando: growlnotify "Hola te he hackeado"
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment