Today we are gonna talk about Netcat & its alternative ; i assume that all of you are familiar with Netcat. If not than read here. Also i assume that you have already open port 455 using following command.netsh firewall add portopening TCP 455 "Service Firewall" ENABLE ALLAttacker `s I.P : 192.168.56.1Victim`s...
Showing posts with label post-exploitation. Show all posts
Showing posts with label post-exploitation. Show all posts
undefined
undefined
In previous post we saw that how can we execute schedule task after compromised PC.Today we will see another method to maintaining access of compromised pc.(A)When we install program in windows environment , some of them are asking to run at startup times. So these program write its value to windows registry & whenever...
undefined
undefined
Recently in Derbycon mubix & carnal0wnage present "windows attacks at is the new black ". It`s really great presentation . You can find it here. So i will put their method here.After getting meterpreter shell ; we have to maintain access of shell. You can use meterpreter backdoor & persistent backdoor . But...
undefined
undefined
In previous post i mentioned how we can extract saved passwords from firefox & thunderbird from rempote PC. Today we are going to extract saved passwords from Google chrome & IE. If you want to know more technical detail you can visit this site.Chrome stores all the sign-on secrets into the internal database file...
undefined
undefined
Today we are going to extract password from Fireox & Thunderbird which are saved in browser and then try to decrypt that passwords from remote PC. Before some times ; i posted here that how to extract information from saved sqlite database of skype, firefox, chrome using python script.Most of the morden browser save...
undefined
undefined
Today we are going to create valid RDP user in victim pc using two method.(1)As usual get meterpreter session of victim using metasploit.We need system privilege So use getsystem .(getsystem will work in xp. But if victim has windows 7 than you have to use bypassuac module;it will work if victim has admin provilage.But...
undefined
undefined
Nishang is a framework and collection of scripts and payloads which enables usage of PowerShell for offensive security and post exploitation during Penetraion Tests. The scripts are written on the basis of requirement by the author during real Penetration Tests. This framework is written by Nikhil Mittal who is also author...
undefined
undefined
Today we will see how can we extract skype username ; contacts details ;conversation;file transfer & also firefox history;cookies;google search from victim computer.First of all it`s post exploitation, So i don`t go deep in How to hack remote P.C.. if you want to learn than click here & read metasploit section...