Penetration Testing Blog ||| Redefine Your Network Security |||

Thursday, 8 March 2012

Hacking Windows 7 USING Backtrack 5



LEARN FIRST HACK & PATCH WINDOWS 7 

  • To Hack we use : Backtrack 5
  • To Patch we use: Firewall & Antiviruses


" HACKING WINDOWS "

Lets start start your Backtrack 5 and open terminal . In terminal type the command shown below -


Here is your IDM.exe created by msfpayload


Here is you newly created IDM.exe file

UPLOAD YOUR IDM.exe ON ANY FILE SHARING WEBSITE


On Backtrack 5 .Open your browser and type your file sharing website link and click on upload link .

(REMEMBER: You have to create a account if you are using 4shared.com website to upload you files)


OPEN YOUR DESKTOP DIRECTORY 


SELECT YOUR EXE AND PRESS OK

CLICK ON SEND FILES .

THESE ARE THE STEPS YOU HAVE TO FOLLOW WHEN YOU UPLOAD YOUR FILE FROM BACKTRACK 5   BROWSER

OR

YOU CAN ALSO UPLOAD YOUR FILE FROM ANY OTHER PC AS SHOWN BELOW 


CHOOSE YOUR FILE AND CLICK ON UPLOAD 


HERE IS THE LINK  OF YOUR UPLOADING FILE SHOWN ABOVE

MSFCONSOLE

Now open a new terminal and type msfconsole 



Wait a minute , it takes time to upload ,Be Patience.


Here it is your Msfconsole is open now 



 Type this line to start the exploit handler


Now set the Payload 


Set the LHOST(LOCAL HOST ) 

Remember : You here after LHOST you have to enter your own ip -address



TYPE EXPLOIT AND PRESS ENTER BUTTON 


HERE IT IS YOUR PAYLOAD HANDLER STARTED

Now On the Victim Machine 

If the Suppose you tell your friend download IDM.exe [IDM(A well known software Internet Download Manager through which you can download files and vedios) on your system and your friend follow this link and download this software.As shown below :-


Victim Open the link and click on Download 


Wait 


Now victim downloading IDM.exe file.


After downloading the File . Once the Victim click on the Run Button .The reverse_tcp started and the responses is reflect on the Backtrack 5 ,check the next image.


Here you can see the responses coming from the ip 192.168.127.134 and also 1 session is opened now .


Now type shell to create a channel . hey but no channel created . Lets try it again.


Volla !!! Now on 2nd try channel is created between windows 7 and Backtrack 5.

LETS CHECK WHICH VICTIM SYSTEM INFO


Type sysinfo on the backtrack 5 to check the victim System information.


EXAMPLE 1: Now lets created a new directory 
named hackingDNA

And use dir command to check it is created or not . 



Also you can view on victim machine ,here also hackingDNA directory is created .



EXAMPLE 2 : Here you can see the directories structure showed on both the system.


EXAMPLE 3 : CHECKING WINDOWS 7 IP CONFIGURATION .


This is how you can do changes with the victim machine , now think from your mind , if you are more stylish and creative type ,then make your own changes and if your are very bad then run some batch files or configure any file which damamge the victim system . 
This is how a bad thing a hacker can do -

  • Hacker can damage your system . 
  • Hacker can made changes on your system.
  • Hacker can delete all your files.
  • And many more tricks which you never think about it .
"PATCHING WINDOWS"

But if there is a hacker so always there are Ethical Hacker to patch all these activities .So be like a good guy and follow these steps -


Always On your Firewall : Which identify these type activity
                            and stop them right on the door . 
   It never let create these types of channel, what we created above.

ALWAYS USE UPDATED ANTIVIRUS :Why I am saying updated antivirus , 
                              Have you remember earlier in the first step a hacker on the Backtrack 5 created a IDM.exe file ,now if your Antivirus is updated and original or say  genuine one antivirus itself detect the IDM.exe as a virus and alert you to not to download that file . And suppose in case you downloaded  that file then  your Antivirus delete it automatically .

So always use Kaspersky , Quick Heal ,Norton antivirus and don't forget to update it .

BLOCK YOUR ICMP PORT (443) : How to block it and why ?
                             
To Block On Windows Xp click on this link :


In this link you will get all the details why we should block this port  and how to block it .

And in windows 7 I am working on it soon i will posted .

So remember these days HACKING ACTIVITIES are increasing .

Its better to  Save your Self , Save your data ,Save your company and 
 Save your Hardwork 

                      


So this is how we hack the windows 7 Using Backtrack 5 .
AND 

Happy holi 2012 

from 

www.hackingDNA.com


Reply me on my Facebook Page ,did you like this article or not.

Join me @ Facebook
https://www.facebook.com/pages/HackingDNAcom/182908021816884


Remember I am not posting this article to hack, I am doing just to aware you how hackers can access in your life in this DIGITAL WORLD



THIS IS JUST FOR EDUCATIONAL PURPOSE ONLY /-

6 comments:

bobby said...

great!

HackingDNA.com said...

Keep following www.hackingdna.com

Anonymous said...

Great man....

Anonymous said...

Great tutorial,
I have tested on my machines, it work.
How to trick AV so that it will not block the backdoor?

Rachel smith said...

can connect to multiple windows 7 user in a time?

Anonymous said...

Ok I create IDM.exe by msfpayload but when i use msfconsole i see

root@premium:~# msfconsole
[-] WARNING! The following modules could not be loaded!
[-] /opt/metasploit/msf3/modules/post/windows/gather/credentials/outlook.rb: SyntaxError /opt/metasploit/msf3/modules/post/windows/gather/credentials/outlook.rb:35: syntax error, unexpected tLSHFT, expecting ')'
<<<<<<< .mine

and my 2nd problem: when i use exploit command i see:
msf exploit(handler) > exploit

[-] Handler failed to bind to xx.xxx.xxx.xx:4444
[*] Started reverse handler on 0.0.0.0:4444
[*] Starting the payload handler...
^C[-] Exploit failed: Interrupt

XX - i hide my ip to protect myself.

what is the problem and how to solve it?

sorry for my english

Categories

Angry IPScanner On Backtrack 4 Arduino Arduino Opensource community attacks on router auditing tool Aurora Exploiting Through Kali Linux AUTOSCAN ON BACKTRACK 5 BackBox Linux On hackingDNA Backtrack 5 : Linux Commands Backtrack Bootable Pendrive Backtrack Tool : The Harvester Blender On Backtrack 5 Block Command Prompt Browser Autopwn On Backtrack 5 BUGTRAQ LOG REMOVER BLEACHBIT chkrootkit on Backtrack 5 chntpw on backtrack 5 cisco switches routing auditing tool. Client Side Attack On Backtrack 5 Command Shell Upgrade On Backtrack 5 Conky On Backtrack 5 convert guest account into admin using chntpw in backtrack 5 Convert Jpg Image into Ascii on Backtrack 5 countermeasures Cracking Unix Password On Backtrack 5 Cupp On Backtrack 5 Cutycapt On Kali Linux Detect Sniffer6 On Kali Linux dmitry on backtrack 5 Dnmap On Kali Linux dnsenum on backtrack 5 dnsrecon on backtrack 5 dnstracer on backtrack 5 dnswalk on backtrack 5 DOMAIN TOOL ON BUGTRAQ Dos attack driftnet on backtrack 5 dsniff on backtrack 5 enum4linux esp8266 EtherApe On BackTrack 5 ewizard on backtrack 5 ExifTool On BackTrack 5 Exploit Distccd On BackTrack 5 Exploit RDP Vulnerability On Kali Linux Exploit Samba Server On Backtrack 5 fatback on backtrack 5 FERN CRACKER ON BACKTRACK 5 Fierce in Backtrack 5 findmyhash : Crack the hash on Backtrack 5 Firewalk-Script On BackTrack 5 Firewall On Backtrack 5 Flash Player On Backtrack 5 Genlist On Backtrack 5 Gerix Cracker On Backtrack 5 Get Your Data Back Golismero On BackTrack 5 GOOFILE ON BUGTRAQ Google Kung-Fu goohost on backtrack 5 Grendel-Scan On Backtrack 5 gtk-recordmydesktop on backtrack 5 HACK BACKTRACK 5 via RAT Hack The Database with Backtrack 5 Hack the Facebook with Backtrack 5 Hack the windows in GNS3 Hack Windows XP using Backtrack 5 Hack Windows Xp using msfconsole hacking Hacking Lab 01 Hacking Windows 7 USING Backtrack 5 hackingdna hackingDNA choice :Best Antivirus Detection honeyd on backtrack 5 honeypot on backtrack 5 HOW TO INSTALL REDHAT ENTERPRISE LINUX 5 How to block ICMP request How To Install CAINE How to Install Chromium Browser on Backtrack 5 How to Install Windows 7 Ultimate How To Install Xampp On Kali Linux How to make new User in Backtrack 5 How to see files and directories on Linux how to use arduino in kali linux How to use Host Command on Backtrack 5 How to use Nano Editor on Backtrack 5 How to use Ping Command on Backtrack How to use whois tool on Backtrack 5 hping2 on backtrack 5r2 Httprint On BackTrack 5 icmpv6 flooding attack ifconfig command Installing And Accessing Backdoor On Backtrack 5 Installing software on Backtrack 5 using apt-get ipcalc on backtrack 5 Itrace On BackTrack 5 Jigsaw On Backtrack 5 Joomscan On Backtrack 5 KALI ARMITAGE ON KALI LINUX kali linux kali linux arduino Kali Linux Installation Kali Rolling Release 2016.2 keimpx on backtrack 5 Lanmap On Backtrack 4 Learn arping on Backtrack 5 Learn Basic of Internet with DAWN OF THE NET Learn Basics if Screen Utility Learn cmospwd on Backtrack 5 Learn dnsdict6 on backtrack 5 Learn fping on Backtrack 5 Learn Help Utilities Command On Backtrack 5 Learn hexedit on Backtrack 5 Learn how to hack root account on REDHAT5 Learn How to Install Backtrack 5 Learn how to make Bootable Pendrive Learn how to split Terminal into different regions Learn How To Split Terminal on backtrack 5 Learn how to use Armitage in Backtrack 5 Learn how to use chntpw on backtrack 5 LEARN HOW TO USE CISCO PACK ON BUGTRAQ - II Learn How to use ettercap on Backtrack 5 for hacking username and passwords Learn how to use Netstat Commands On Backtrack 5 Learn how to use nipper Learn How to work with Vim editor on Backtrack 5 Learn Linux Commands on Backtrack Environment Learn Netdiscover On Backtrack 5 Learn Pentbox On Backtrack 5 Learn Recoverjpeg on Backtrack 5 Learn samdump on backtrack 5 Learn TrueCrypt On Backtrack 5 LINUX NETWORKING COMMANDS ON BACKTRACK 5 linux OS LINUX PARTITION ON BACKTRACK 5 List-Urls On Backtrack 4 Load Balancing Detector On Backtrack 5 LOG REMOVER BLEACHBIT Lynis On Backtrack 5 Mac Tracker On Backtrack 5 macchanger on backtrack 5 Matriux Installation On hackingDNA Metaexploit Framework : Collecting Email Addresses Metasploit Framework With Basic Commands Meterpreter on Backtrack 5 mitre-cve on backtrack 5 MSF AUXILIARY SCANNING ON BACKTRACK 5 msf scanning on backtrack 5 nbtscan on backtrack 5 NESSUS ON BACKTRACK 5 Net Card Config Netcat : Learn how to create a instant chat session on Backtrack 5 netenum on backtrack 5 Netifera On Backtrack 5 NETMASK On Backtrack 5 NIKTO ON KALI LINUX Nmap Scanning On Backtrack 5 nmap smb script offensive security Oneko And Cowsay On BackTrack 5 OpenOffice On Backtrack 5 OpenVAS On Backtrack 5 Orion Browser History Dumper v1.0 Penetration Testing Pipal On Backtrack 5 PostgreSQL On Kali Linux Practice Session On Backtrack 5 PROTOS on backtrack 5 Reconnaissance Recover Kali Password Remote Desktop Connection Remote Desktop On Backtrack 5 Remote Desktop Sharing Removing Backdoor on Backtrack 5 Restrict Control Panel Restrict Registry Editor by Group Policies Rkhunter On Backtrack 5 router auditing tool Router Penetration Testing router security Safecopy On Backtrack 5 samba testing samrdump on backtrack 5 Scanning security auditing tool Shell Scripting On Kali Linux Shrink and Create Partition on Windows 7 Shutter On Backtrack 5 siege on backtrack 5 smb enumeration smb hacking Smbclient On Backtrack 5 Smtpscan On Backtrack 5 SMURF6 ON KALI LINUX Sniff Images on Backtrack 5 using Driftnet Snort On Backtrack 5 snurf6 Software Updates On Kali linux Spoof Your MAC Address on Backtrack 5 sql attack SSID ssldump on backtrack 5 sslstrip on backtrack 5 Start Backtrack 5 Without Startx Steam Locomotive On BackTrack5 Stop Bruteforce attack System Monitor On Backtrack 5 tcptraceroute on backtrack 5 Tctrace On Backtrack 5 TeamViewer On BackTrack 5 TELNET On Backtrack 5 Terminator On Backtrack 5 the Harvester On Backtrack 5 Things you should know about Backtrack Tweak Your System Settings On Backtrack 5 Tweak Your System Settings On Backtrack 5 Part 2 Unicornscan On BackTrack 5 Uniscan On Backtrack 5 urlcrazy on backtrack 5 urlsnarf on backtrack 5 WBOX on Backtrack 4 and 5 Weak points Web Httrack::Web Copier Websecurify On BackTrack5 Webshag On Backtrack 5 WEP CRACKING ON BACKTRACK 5 whatweb on backtrack 5 WHATWEB ON BUGTRAQ Wiffit (wafw00f): Firewall Detection Tool On Backtrack 5 wireshark Xpdf On Backtrack 5 xprobe2 on backtrack 5 Zenmap

Popular Posts