The Dark Side of the Hacking World: What You Need to Know to Guard Your Precious Assets and Remain Safe by Mike Mason

The Dark Side of the Hacking World: What You Need to Know to Guard Your Precious Assets and Remain Safe by Mike Mason

Author:Mike Mason [Mason, Mike]
Language: eng
Format: epub
Published: 2015-12-24T18:30:00+00:00


● WinRAR

● The Latest Debian-Derived Security Linux Distribution

● Resource Hacker

Step 1: First, you type “msfconsole” into a terminal window. The required Metasploit modules will now load. (Hacker Tip: For the newest versions of exploits and modules, don’t forget to run msfupdate.)

After the loading is completed, you type in “cd \pentest\exploits\set” and hit enter. Now, the Social Engineering Toolkit will load.

Step 2: From the menu, choose 1 for Social-Engineering Attacks and hit enter. Another menu showing options will then appear. Choose 4-Create a Payload and Listener from this menu and hit enter.

Step 3: In order to put together the payload and listener, you’ll now enter some parameters.

You’ll be asked to enter the IP address for the payload. For example, if the IP address is “112.233.44.55” (This is just a theoretical made-up one for example purposes) you’d enter this and hit enter. This will then bring up a menu of various exploit options. In this tutorial, you’ll be using the TCP/IP Reverse Shell exploit.

Step 4: Choose 1 “Windows Shell Reverse_TCP” and hit enter. This will spawn a command shell before sending back to attacker. A new menu will then show up inquiring about the encoding type to use to get past an anti-virus. Choose number 16- “BEST (Backdoored Executable). Hit enter. Now, you’ll be asked to choose the port for the listener.

Whichever port is fine but here go ahead and choose 1337, input it and hit enter. This allows the listener to be created and in the meantime, type “yes” to answer the question: “Start the listener now?”

Step 5: Upon completion, the executable file will be stored in“/pentest/exploits/set/src/program_junk”. The payload has now been created. The next step is to pull from a normal Microsoft executable file in order to have an icon image for the exploit.

Step 6: This stage is important and involves taking an icon image from Kaspersky Scanner file for your exploit.

Items You’ll Need for This Stage:

● A program that you want to pull the icon from-in this case, let’s use Kaspersky Security Scanner



Download



Copyright Disclaimer:
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.
Popular ebooks
Deep Learning with Python by François Chollet(12579)
Sass and Compass in Action by Wynn Netherland Nathan Weizenbaum Chris Eppstein Brandon Mathis(7783)
Grails in Action by Glen Smith Peter Ledbrook(7699)
Secrets of the JavaScript Ninja by John Resig Bear Bibeault(6420)
Kotlin in Action by Dmitry Jemerov(5067)
WordPress Plugin Development Cookbook by Yannick Lefebvre(3810)
Mastering Azure Security by Mustafa Toroman and Tom Janetscheck(3334)
Learning React: Functional Web Development with React and Redux by Banks Alex & Porcello Eve(3088)
Mastering Bitcoin: Programming the Open Blockchain by Andreas M. Antonopoulos(2870)
The Art Of Deception by Kevin Mitnick(2607)
Drugs Unlimited by Mike Power(2468)
Kali Linux - An Ethical Hacker's Cookbook: End-to-end penetration testing solutions by Sharma Himanshu(2315)
The Innovators: How a Group of Hackers, Geniuses, and Geeks Created the Digital Revolution by Walter Isaacson(2311)
Writing for the Web: Creating Compelling Web Content Using Words, Pictures and Sound (Eva Spring's Library) by Lynda Felder(2263)
SEO 2018: Learn search engine optimization with smart internet marketing strategies by Adam Clarke(2194)
A Blueprint for Production-Ready Web Applications: Leverage industry best practices to create complete web apps with Python, TypeScript, and AWS by Dr. Philip Jones(2192)
JavaScript by Example by S Dani Akash(2138)
DarkMarket by Misha Glenny(2084)
Wireless Hacking 101 by Karina Astudillo(2079)
Full-Stack React Projects by Shama Hoque(1991)