Ethical Hacking_51CTO博客
Hacking is gaining unauthorized access to anything. Preparation Setting up a lab and installing needed applications and operating systesm. Basics abou
转载 2019-10-31 22:16:00
82阅读
2评论
Polish the Python code by adding the become_persistent function. Convert to Windows executable file. Execute the reverse_backdoor file on the victim W
转载 2019-10-13 11:43:00
187阅读
REVERSE_BACKDOOR Access file system. Execute system commands. Download files. Upload files. Persistence. BACKDOORS An interactive program gives access
转载 2019-10-05 16:18:00
147阅读
Report function: Run in the background. Don't interrupt program execution. Every X seconds, send the report. ->Great case for threading.
转载 2019-10-05 11:15:00
199阅读
What is DNS Spoofing Sniff the DNSRR packet and show on the terminal. Analyze the following DNSRR records. Redirecting DNS Responses The set_payload()
转载 2019-09-01 17:56:00
270阅读
CLIENT SIDE ATTACKS - Backdooring exe' s Download an executable file first. VEIL - FRAMEWORK A backdoor is a file that gives us full control over the
转载 2020-01-29 15:17:00
268阅读
2评论
Server Side Attack Nexpose - Analysing Scan Results and Generating Reports OS and Software Inforation. Services Information HTTP Service Detailed Info
转载 2019-12-29 21:29:00
45阅读
2评论
Server Side Attack Analysing scan results and exploiting target system. Go to the Analysis page and find the target host. Scan restult - services: Sca
转载 2019-12-29 14:43:00
32阅读
2评论
Server Side Attacks - INFORMATION GATHERING Need an IP address. Very simple if target is on the same network (netdiscover or zenmap). If target has a
转载 2019-12-19 22:16:00
69阅读
2评论
Server Side Attacks - NEXPOSE NeXpose is a vulnerability management framework, it allows us to discover, assess and act on discovered vulnerabilities,
转载 2019-12-29 16:22:00
68阅读
2评论
CLIENT SIDE ATTACKS - Spoofing backdoor extension Change the extension of the trojan from exe to a suitable one. Make the trojan even more trustable.
转载 2020-02-05 07:59:00
83阅读
2评论
Sever side attacks code execution Let‘s analyze the Zenmap scan result first and search for something vulnerabilities about Samba smbd 3.x. We find th
转载 2019-12-22 19:54:00
85阅读
2评论
PRESISTENCE Persistence programs start when the system starts. Backdoors -> maintain our access. Keylogger -> spy on target. Reports -> send report on
转载 2019-10-09 22:26:00
232阅读
Cross-platform hacking All programs we wrote are pure python programs They do not rely on OS-specific resources. Result: They work on any OS with a py
转载 2019-10-07 12:04:00
64阅读
Refactoring - Creating a Listener Class Creating a Backdoor class:
转载 2019-10-05 17:18:00
104阅读
A program that records keys pressed on the keyboard. Common features: Store logs locally(local keyloggers). Report logs to an email or remote server(r
转载 2019-10-04 18:40:00
530阅读
CLIENT SIDE ATTACKS Protecting against smart delivery methods Ensure you're not being MITM'ed -> use trusted networks, xarp. Only download from HTTPS
转载 2020-01-05 13:12:00
46阅读
2评论
CLIENT SIDE ATTACKS - Listening for connections 1. Run Metasploit Move the backdoor file to the webserver folder. And download it on the target machin
转载 2020-01-01 06:56:00
35阅读
2评论
Gaining Access Introduction Everything is a computer Two main approaches (1)Server Side Do not require user interaction, all we need is a target IP! S
转载 2019-12-19 20:50:00
56阅读
2评论
Spying - Capturing Key Strikes & Taking Screen Shots Log all mouse/keyboard events > keyscan-start - show current working directory > keyscan-dump - l
转载 2020-02-06 20:04:00
65阅读
2评论
  • 1
  • 2
  • 3
  • 4
  • 5