First thing you gonna do all this from Localhost use "Wamp" or "Easy php". Then upload a shell with full option like my shell ^_^
We are not going to target a website of the server and try to upload a shell and try to symlink or root ^_^
Linux xxxxxxxxxxx.xxxxxxxxxxx.net 2.6.32-379.19.1.lve1.2.7.el6.x86_64 #1 SMP Wed Jan 23 14:53:41 E
As we can see Linux and the kernel version is 2.6.32 x86_64
Now what to do ?
Go to www.google.com and type this: Linux 2.6.32 x86_64 exploit
you will find many exploits find the right exploit script upload it in your Localhost then edit it with the IP of your
server target and choose the right port of the exploit if the exploit is SSH (22) , FTP (21) , etc.....
Then use Netcat to make Backconnect from your Shell if Backconnect is not etablished that's mean that your
server target has been patched or you are not using the right port to backconnect or you need to forward
your port.The rest you can do it from putty i'm not going to talk about this here i'm just giving
some educational informations ^_^
Another method is to find the host of the server for example if you ping www.google.com
Ip is 173.194.34.19
The Host is "par03s02-in-f19.1e100.net" but as you know Google is very secured all their system is from localhost
and most of their services in remote are Filtred , so How many Google Websites of some countries was Hacked
Well they wasn't certified by "Google Inc" so if you scanned them in the past you could find a port open in the server
or the host enabled , even a exploit in the kernel or a Dns Exploit ^_^ if you try to telnet the port 25 (SMTP)
of Google you will find it open certainly "Limited" (.....) but there is no a hacker that can exploit it yet ^_^