Zerosecurity
  • Home
  • Security
    • Exploits
    • Mobile Security
  • Malware
  • Data Breaches
  • Crypto
  • Privacy
  • Downloads
    • Malwarebytes
    • Exploits
    • Paper Downloads
    • Software & Service Reviews
No Result
View All Result
SUBSCRIBE
Zerosecurity
  • Home
  • Security
    • Exploits
    • Mobile Security
  • Malware
  • Data Breaches
  • Crypto
  • Privacy
  • Downloads
    • Malwarebytes
    • Exploits
    • Paper Downloads
    • Software & Service Reviews
No Result
View All Result
Zerosecurity
No Result
View All Result
Home Tutorials

Metasploit Tutorial By Un0wn_X

Paul Anderson by Paul Anderson
April 19, 2013 - Updated on April 22, 2013
in Tutorials
0
74
SHARES
1.2k
VIEWS
Share on FacebookShare on Twitter
I made a small tutorial on integrating DNS in Metasploit backdoor executables. If you don’t know about creating backdoors please refer my previous tutorial http://www.youtube.com/watch?v=NiBsBKGf80Y.  You should know how to configure RATs. We use a DNS because our external IP changes every time. So a normal reverse_tcp connects like this.
Victim’s internal IP—>Victim’s external IP—> Attacker’s external IP—> Attacker’s Internal IP
 
But most of the time the Attacker’s External IP is Dynamic and changes. For that we can use a free domain name server such as No-IP. First of all create an account on No-IP and configure your DUC client correctly. Next make sure you port forward you router to a new internal IP. That is your Back Track machine. Use a bridged connection in Network settings because we are going to add our BT machine to our internal IP Range. So here we use the payload as windows/meterpreter/reverse_tcp_dns in making our backdoor. As the DUC client sends our External IP and updates our no-ip domain DNS is acting static. This is how it works.
 
Victim’s internal IP—> Victim’s external IP—> Attacker’s DNS—>Attacker’s external IP—> Attacker’s Internal IP
 
Set the LHOST to your no-ip domain, mine is (boomboom.no-ip.com). Set the LPORT to your forwarded port for the BT machine. Those are things new we should modify in making our backdoor the rest are normal.
Now launch metasploit and use the multi/handler exploit which handles exploits outside the network. Set the LHOST to your internal IP which BT has been assigned. Set LPORT to your forwarded port number and exploit. Once the victim opens the backdoor it back connects through the DNS to our IP successfully. Now you can use that at any time because of DNS, it will be little similar to RATs. Making it FUD and undetectable is up to you. This video is just a demonstration and Special Thanx to Max for acting as the victim and helping me making this video in real world. 

Use this for Educational Purposes Only and I am not responsible for the damage you cause.

You might also like

Application hardening tips

Low Level IPhone programming

CDP Flood Attack

Tags: how tometasploittutorialvideo
Share30Tweet19
Paul Anderson

Paul Anderson

Editor and chief at ZeroSecurity. Expertise includes programming, malware analysis, and penetration testing. If you would like to write for ZeroSecurity, please click "Contact us" at the top of the page.

Recommended For You

Application hardening tips

by Paul Anderson
May 31, 2014
0
Application hardening tips

When a exploit has been discovered in an operating system or program the vendor pushes a patch or upgrade that eliminates the vulnerability. “Hardening” is the act of...

Read more

Low Level IPhone programming

by Paul Anderson
May 28, 2014
0
Low Level IPhone programming

Video from JailbreakCon Twitter: @JailbreakCon - http://twitter.com/JailbreakCon "Low Level iPhone Programming (And more!)" by winocm Slides: http://cl.ly/3B0U0i3X3n2W

Read more

CDP Flood Attack

by Paul Anderson
October 9, 2013 - Updated on February 24, 2014
0
Hacking With Netcat Basics

The Cisco Discovery Protocol (CDP) is a proprietary Data Link Layer protocol developed by Cisco Systems. It is used to share information about other directly connected Cisco equipment,...

Read more

LFI exploitation via php://input

by Paul Anderson
September 9, 2013 - Updated on September 16, 2013
0
LFI exploitation via php://input

Released by Zentrix, video description: Credits to my brothers Hooded Robin for teaching me this and also to Haxor. Special thanks to my brothers in Intra and Intra...

Read more

Safari Forensic Tutorial

by Paul Anderson
April 20, 2013
1
Safari Forensic Tutorial

Introduction In Mac OS X, iOS and in many apple products store serialized objects in property list files (.plist). These file are used to store information of applications,...

Read more
Next Post
New XSS Zero-Day Method Discovered by Sl1nk

New XSS Zero-Day Method Discovered by Sl1nk

Related News

NSA intercepting U.S. Routers

NSA intercepting U.S. Routers

June 6, 2014 - Updated on March 17, 2023
Netwire RAT seized by FBI and other worldwide police agencies

Netwire RAT seized by FBI and other worldwide police agencies

March 16, 2023
The Emotet botnet returns and is sending a slew of malicious emails

The Emotet botnet returns and is sending a slew of malicious emails

March 14, 2023
Zerosecurity

We cover the latest in Information Security & Blockchain news, as well as threat trends targeting both sectors.

Categories

  • Crypto
  • Data Breaches
  • DotNet Framework
  • Downloads
  • Exploits
  • Exploits
  • Information
  • Legal
  • Malware
  • Malware Analysis
  • Mobile Security
  • Paper Downloads
  • Piracy
  • Privacy
  • Programming
  • Public
  • Security
  • Security
  • Software & Service Reviews
  • Technology News
  • Tools
  • Tutorials
  • Video Tutorials
  • Whitepapers
  • Zero Security
  • Contact Us
  • List of our Writers

© 2022 ZeroSecurity, All Rights Reserved.

No Result
View All Result
  • Home
  • Security
  • Exploits
  • Data Breaches
  • Malware
  • Privacy
  • Mobile Security
  • Tools
  • Contact Us
  • Privacy Policy

© 2022 ZeroSecurity, All Rights Reserved.