RssA1: All about Computer & Hacking

duminică, 11 noiembrie 2012

All about Computer & Hacking

All about Computer & Hacking


Learn how to use Armitage in Backtrack 5

Posted: 11 Nov 2012 06:40 AM PST




Introduction
  • Armitage is the GUI based tool for Metasploit , that shows the targets , exploits in the framework.
Features of Armitage 
  • With Armitage you can scan all the alive host on the network .
  • Armitage recommends exploits and will optionally run active checks to tell you which exploits will work. 
  • If these options fail, use the Hail Mary attack to unleash Armitage's smart automatic exploitation against your targets.
  • When you successfully exploit the target ,  With the click of a menu you will escalate your privileges, log keystrokes, browse the file system, and use command shells.
Requirements 
  • Latest Metasploit framework 4.3 or above 
  • Oracle Java 1.7

Step 1 : Open armitage on Backtrack 5.
  • Click on Backtrack > Exploitation Tools > Network Exploitation Tools > Metasploit Framework > armitage
  • See the below image for more details how to open armitage n Backtrack 5 r2.
                            

Step 2 : Connect Armitage 
  • Click on the connect Button .
  • See the below image for more details -
                                       

Step 3 : Connecting Armitage 
  • It takes few minutes to connect . So have some patience.
                                          
Step 4 :  Armitage Window 

  • Here is your armitage window shown below - 
                                            
  • Armitage has 3 panels : -
  1. TARGET PANEL : It represents the computer ip address and other information .
  2. MODULE PANEL: It shows the auxiliary,exploit,payload and post.
  3. TABS PANELArmitage opens each dialog, console, and table in a tab below the module and target panels. Click the X button to close a tab
                             
Step 5 : Find the alive host on the Network 

  • In this step we have to search for the host .
  • Under the Nmap Scan, select the  option > Quick Scan (OS detect)
  • See the below image for more details .
                                    
  • Here you have to enter the scan range . 
  • Here 192.168.222.0/24  this is  class C range.
  • Example image shown below -
                                    
  • Your Scan is complete now .
  • If the nmap scan find the alive host , then it will be shown on your Target Panel .(As shown  Below )
  • See the below image for more details -
                                   
Step 6 : Finding Attacks 

  • Click on the Attacks > Find Attacks .
  • It will find the most suitable attack for host shown in the Target Panel.
  • See the image shown below -
                                       
  • When  attack analysis finished , it informs with a message shown in the image below -
                                        
Step 7 : Set the vulnerebility
  • Right click on the host 
  • Click on smb 
  • Select the ms08_067_netapi  vulnerebility .
                                         
  • Click on the checkbox - Use  a reverse connection .
  • Now click on the Launch Button .
                                          
Step 8 :
  • If the target host is vulnerable then its color changes to red .That means we can attack into the computer system.
                                          

Create A Run Command

Posted: 11 Nov 2012 05:45 AM PST


Today, I'm going to share a simple trick about Windows Run utility. Do you use 'Run' in windows for opening your applications easily and fastly? Yes, you use it, if I am not wrong, because many of us use it, you put a already created command, hit enter and a the desired application opens. So, what you think? Want to create your own command? Ok, read on to find how to create one for your favorite applications.



Actually, Run on Windows Operating System is something like a simple application that allows to open an application directly without navigating to its actual location and double-clicking on that executable file.

Let's move on to Create a Run Command
The process is very easily, just follow these simple steps carefully,


  • Open Run ( Navigate to Start Menu, then click on 'Run' )
  • In the box type the following command- 'regedit', it will open the window's registry, it is a place where various configurations of the Operating System are stored. Please don't mess with Window Registry, if you don't know a lot about it.
  • Then go to HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Apps Path
  • In the Apps Path, you will see a huge list of executable(.exe) files like this:

  • So, after that right click on Apps Path, then New, choose 'Key'


  • Give it a name like hacker.exe or anything that feels good to you.
  • Right Click the (Default) under Name, and click on Modify
  • Change the 'Value data' to the path of the .exe file which you are going to run, like 'C:\Program Files\Internet Explorer\IEXPLORE.EXE

  • Now Create a new String Value by just Right-Clicking, then 'New', choose 'String Value', named it 'Path', after then, open it, and paste the same link which you have put in the 'Value Data' of (Default) String, i.e, 'C:\Program Files\Internet Explorer\IEXPLORE.EXE'. You will see something like this.

  • Now, all is done, you just have to open 'Run' once again and type the name of your command i.e, hacker.exe and the appointed application will open.
It's very easy to do, you can create many personal 'Run' command using this and use it, comment if you get any type of error or else.

Niciun comentariu:

Trimiteți un comentariu