Showing posts with label metasploit. Show all posts
Showing posts with label metasploit. Show all posts

10/11/2014

Penetration Testing: Crash Windows 7 Using Metasploit and RDC Vulnerability


Crashing Windows 7
Now while the story so far has been smooth and cozy, it gets a bit tough from here on. For modern operating systems like Windows 7, there aren’t any magical exploits like the ones we had for unpatched Windows XP machines. We had been able to hack Windows XPand try some meterpreter features on the exploited XP machine. However, when it comes to Windows 7, there aren’t any direct exploits for gaining access to the machine. We can try some client side attacks, etc. Social engineering toolkit would be great for stuff like that. However, there is still one vulnerability that waits to be exploited. In Windows 7, there is a hole in the RDP port (3389) which can work over LAN as well as over the internet. Over the internet stuff can get a bit tougher, however on the LAN, this should be a piece of cake if you have successfully followed out pentest tutorials so far.

Requirements
Now you will require an attacker Kali machine, and a victim Windows machine, both running on Virtual machines. Windows 7 should be a fresh install, with no updates, as they can patch the vulnerability, making it unexploitable. Now when you have got all this setup, you can move on to further steps.

Information Gathering
Now you’ll have to find out the IP of out victim. This would have been complicated in a real life scenario, but in our case, you just go to Windows 7, open command prompt, and type ipconfig You should be looking for IPv4 address of Local Area Network.

In our case thats where the information Gathering Stops.

Starting Metasploit
Now execute the following commands to start metasploit framework.
service postgresql start
service metasploit start
msfconsole

Exploit
Now select the exploit that we are going to be using.
auxiliary/dos/windows/rdp/ms12_020_maxchannelids
Now do a show options, it will tell you that it only requires two options, RHOST and RPORT. Rport is obviously 3389, the remote desktop port. The RHOST is the one you found out in the information gathering step. use the following code to set the RHOST set RHOST 192.168.—.—
Surprising as it may seem, we are done already. Just type exploit and The target machine will get a Blue Screen of Death and will reboot. You can do this as many times as you feel like, and in real life scenario, it can be really annoying, considering it can be done over the internet too.

Possible Problems

If you get an error of this sort, then most probably your Windows 7 machine has firewall enabled, and is blocking your packets. An antivirus could do the same thing. There might be some issues with the LAN connection too. A good diagnosis test would be to ping the machine. Go to a kali terminal and execute ping 192.168.—.—
After waiting for a while, press ctrl C which will stop the pinging.

If you get something like this (0 packets received), then there is absolutely no communication between the Kali and Windows machine (in effect, they are not on the same network, even though they are). That’s why the exploit doesn’t work.

Something like this means that the connection is just fine, and probably the Windows machine has become immune to the attack due to some patch. Look Here If its the former case, then you’ll have to find a way to get the connection working, and if its the latter, then try disabling firewall, antivirus, and maybe setting the network as home instead of public. Then go to advanced sharing settings, and choose all the options that you think will make your computer easier to hack. If possible, see if you can uninstall updates. The final thing to do is to get an early unpatched release of Windows 7. In some cases installing VMware tools might help.

Enable Remote Desktop
In many Windows releases, remote desktop is turned off by default. To enable it, follow these steps:
Go to System Control Panel\System and Security\System). Click on Remote settings. Select the “Allow Remote Connections to this computer” button. Click OK.
Love this article?
Share it with your friends on Facebook

09/11/2014

Hack Into Emails And Facebook Using Kali Linux


Kali Linux is undoubtedly one of the most popular and advanced penetration testing platforms till date. Many or even most hackers prefer to use this platform for all their endeavours. Ethical hacking also is a much sought after field and here’s something that Kali Linux users will appreciate.
The following steps show how to clone email and Facebook using Backtrack 5 or Kali Linux.
1. Download Kali Linux from it's official Website.
2. Extract the contents of Kali Linux file which you downloaded in above step and copy it to pendrive or instead of pendrive burn the file in CD if you want to make a CD of it.
3. After copying the contents, reboot your system and press F8 on boot time then select boot from pendrive if you have copied all the files in pendrive else boot from CD-Rom if you burn the file in CD.
4. After selecting the boot from device, the kali installation window will open, install accordingly as per your requirement.
NOTE: During installation, in mount point of selected installation drive, set mount point to"/".
5. Remember the username and password while installation as this will be necessity for this hacking method.
6. Once the installation is completed, system will reboot and log into your account.
7. Your system is ready for use.
8. Open the backtrack terminal use the ifconfig command to find your IP address.
9. On the terminal type cd/pentest/exploits/set
10. You will need to have the Social Engineering Toolkit (SET) for this one.
11. Start this use and then choose the second option which says Website Attack Vectors.
12. In the next part you have to select the 4th option, which says Tabnabbing Attack Method.
13. Choose the second option, which is Site Cloner.
14. Now you have to enter the URL of the website that you want to clone or hack into. In this case the URL will be www.ymail.com. The SET will automatically create the clone. Press enter in order to continue.
15. The URL now needs to be converted into the Google URL. For this use goo.gl and send the link address to your targeted person via email, chat etc.
16. When your victim will open their internet browser for Gmail, they should get a message saying that the page is still loading. As soon as they open a new tab, the fake clone that we made will start functioning.
Once the process is completed, you will see something as shown in the image below.
The next step is the most important step, till now we have create the IP address go online and anyone who visit your IP address will see the page which will look like the website of whose url you entered to clone. In this step you need to shortened your IP address by using services like ADF.LY, Binbox, Goo.gl,etc. Once you enter your IP Address on these sites to shorten, they will provide you a link, all you need to do is just send this shortened link to your victim.
When the victim visit the url which you have sent, will see a same page of which url you had entered to clone. The victim will think that it is a original page and when the victim enters any of their information you will find it in the terminal.
In this example i have used ymail.com. Therefore, the victim will see homepage of yahoo mail.
If you get stuck anywhere give us your IP using this link in order to let us get control on your machine for remote kali setup. (We'll not take responsibiliy of any kind of demage caused by remote setup. you must do it at your own risk).
Love this article?
Share it with your friends on Facebook