Saturday, 11 August 2012

Installing And Accessing Backdoor On Backtrack 5


INSTALLING & ACCESSING BACKDOOR 
installing and accessing backdoor

INTRODUCTION 
  • Metasploit has a ability to install a backdoor on remote pc to maintain access after the exploitation . 
  • Through the metsvc module , you can create a persistant backdoor on a remote PC .
THINGS TO REMEMBER 
  • The ' metsvc  ' service require no authentication , it means if anyone find our backdoor they can also access it . 
INSTALLING  BACKDOOR 

HELP COMMAND 
  • Command Used : run metsvc -h 
  • This command will show you the options . 

run metsvc -h

RUN METSVC(Installing Backdoor)
  • To install backdoor use the command .
  • Command Used : run metsvc 
  • In the below image you can see the files are uploading on the remote system . 
  • See the below image for more details - 

run metsvc


HERE IS THE BACKDOOR INSTALLED 
  • In the below image you can see the folder named rNuqIiQCSiN is successfully uploaded in the Temp directory of Remote PC . 
  • See the below image for more details -

uploaded files on windows xp

Inside the Directory 

  • Here you can see the metsrv dll and exe files .
  • See the below image for more details - 

uploaded files on windows xp

RESTART MY WINDOWS XP 
  • After setting the backdoor successfully on the remote system , now I am going to restart remote PC  . 
  • The reason behind the restarting is to check ,wheater the backdoor i have installed will worked or not. 
  • See the below image , it show my remote pc (  Windows xp ) is starting -

windows xp restarting


ACCESSING BACKDOOR 
  • Now time to Accessing the Backdoor that we created . 
  • To access the Remote PC again. We have to use the multi_handler with  Payload .
  • See all the steps below to access the backdoor , that we set before -

Step 1 : Set Multi handler Exploit
  • See the below image for the comamnd - 

multi-handler

Step 2 : Set PAYLOAD
  • See the below image for the command -
set PAYLOAD

Step 3 : Checking all Fields 
  • To checking all the fields , use the show options command . 
  • See the below image for the command .

show options

Step 4 : Set RHOST & LPORT 
  • In this step you have to Set the Remote Host & Local Port .
  • See the below image for more details -

Set rhost and lport

Step 5 : Last Checking 
  • In this step for the last time check it again all the fields .
  • To check we again use the show option again .
  • See the below image for more details - 

show options

Step 6 : Exploit ( FINAL STEP )
  • Now this is the Final Step  , you just have to exploit the target to get the meterpreter session again .
  • Enter the Command : exploit  and hit enter .
  • And finally we get the meterpreter session again . 

exploit

On Windows (Task Manager)
  • On Windows Task Manager , you can see the meterpreter-server.exe process is running on your SYSTEM .
  • See the below image for more details - 

on windows machine

AT THE END 
  • Q. Why we use port 31337  ?
  • A.  Because port is used for all the backdoor services  . So if you use different ports it will not create a meterpreter session when you exploit . 
  • So remember to use the port 31337 .
  • Also  31337 is a hackerz spelling of 'elite', meaning 'elite hackers'.
So this is how we can , Install a backdoor on remote pc  and Access it again on Backtrack 5 
I hope you like this tutorial . Any feedback are warm welcome . 

keep following www.hackingdna.com because lots more hacking/penetration Testing  tutorial still to come . 
JOIN US 
ON 
FACEBOOK 

THIS TUTORIAL IS JUST FOR EDUCATIONAL PURPOSE ONLY/-

5 comments:

Anonymous said...

Hey bro.. Your site provide me Nice guidance.. I am running BT5 on VMWARE.. but it not detect my Wireless Adapter... can u help me to connect that inbuilt hardware with VMWARE..?

HackingDNA.com said...

Most Welcome to www.hackingdna.com . Brother to detect your Wireless Adapter you have to run your backtrack live or run it through your hardisk . Via VMware it will not detect your Wireless Adapter.

Sanjit Patel said...

oh k..i think it my happen but now i can see that every hardware in BT will work on live only.. good.. but bro there is 1 problem.. i cant save any setting or changes in live.. thats y i dont like it.. i was using backtrack 5 since last 1.5 year.. last month i had remove it.. before that i had dual os Backtrack + Win Xp...

no problem bro..

Nice Website i like it..

this is my patelsanjit.blogspot.com

sandeep ghosh said...

hey bro thnxx for ur all the stuffs bcz it has helped me a lot .....As m new to BT thr4 m gttng error while using run metsvc -h command its showing bad command ............plzzz help me bro.

Mattias Pettersson said...

same problem here, metsvc -h gives
"msf > ./metsvc
[-] Unknown command: ./metsvc."

Categories

Angry IPScanner On Backtrack 4 Arduino Arduino Opensource community attacks on router auditing tool Aurora Exploiting Through Kali Linux AUTOSCAN ON BACKTRACK 5 BackBox Linux On hackingDNA Backtrack 5 : Linux Commands Backtrack Bootable Pendrive Backtrack Tool : The Harvester Blender On Backtrack 5 Block Command Prompt Browser Autopwn On Backtrack 5 BUGTRAQ LOG REMOVER BLEACHBIT chkrootkit on Backtrack 5 chntpw on backtrack 5 cisco switches routing auditing tool. Client Side Attack On Backtrack 5 Command Shell Upgrade On Backtrack 5 Conky On Backtrack 5 convert guest account into admin using chntpw in backtrack 5 Convert Jpg Image into Ascii on Backtrack 5 countermeasures Cracking Unix Password On Backtrack 5 Cupp On Backtrack 5 Cutycapt On Kali Linux Detect Sniffer6 On Kali Linux dmitry on backtrack 5 Dnmap On Kali Linux dnsenum on backtrack 5 dnsrecon on backtrack 5 dnstracer on backtrack 5 dnswalk on backtrack 5 DOMAIN TOOL ON BUGTRAQ Dos attack driftnet on backtrack 5 dsniff on backtrack 5 enum4linux esp8266 EtherApe On BackTrack 5 ewizard on backtrack 5 ExifTool On BackTrack 5 Exploit Distccd On BackTrack 5 Exploit RDP Vulnerability On Kali Linux Exploit Samba Server On Backtrack 5 fatback on backtrack 5 FERN CRACKER ON BACKTRACK 5 Fierce in Backtrack 5 findmyhash : Crack the hash on Backtrack 5 Firewalk-Script On BackTrack 5 Firewall On Backtrack 5 Flash Player On Backtrack 5 Genlist On Backtrack 5 Gerix Cracker On Backtrack 5 Get Your Data Back Golismero On BackTrack 5 GOOFILE ON BUGTRAQ Google Kung-Fu goohost on backtrack 5 Grendel-Scan On Backtrack 5 gtk-recordmydesktop on backtrack 5 HACK BACKTRACK 5 via RAT Hack The Database with Backtrack 5 Hack the Facebook with Backtrack 5 Hack the windows in GNS3 Hack Windows XP using Backtrack 5 Hack Windows Xp using msfconsole hacking Hacking Lab 01 Hacking Windows 7 USING Backtrack 5 hackingdna hackingDNA choice :Best Antivirus Detection honeyd on backtrack 5 honeypot on backtrack 5 HOW TO INSTALL REDHAT ENTERPRISE LINUX 5 How to block ICMP request How To Install CAINE How to Install Chromium Browser on Backtrack 5 How to Install Windows 7 Ultimate How To Install Xampp On Kali Linux How to make new User in Backtrack 5 How to see files and directories on Linux how to use arduino in kali linux How to use Host Command on Backtrack 5 How to use Nano Editor on Backtrack 5 How to use Ping Command on Backtrack How to use whois tool on Backtrack 5 hping2 on backtrack 5r2 Httprint On BackTrack 5 icmpv6 flooding attack ifconfig command Installing And Accessing Backdoor On Backtrack 5 Installing software on Backtrack 5 using apt-get ipcalc on backtrack 5 Itrace On BackTrack 5 Jigsaw On Backtrack 5 Joomscan On Backtrack 5 KALI ARMITAGE ON KALI LINUX kali linux kali linux arduino Kali Linux Installation Kali Rolling Release 2016.2 keimpx on backtrack 5 Lanmap On Backtrack 4 Learn arping on Backtrack 5 Learn Basic of Internet with DAWN OF THE NET Learn Basics if Screen Utility Learn cmospwd on Backtrack 5 Learn dnsdict6 on backtrack 5 Learn fping on Backtrack 5 Learn Help Utilities Command On Backtrack 5 Learn hexedit on Backtrack 5 Learn how to hack root account on REDHAT5 Learn How to Install Backtrack 5 Learn how to make Bootable Pendrive Learn how to split Terminal into different regions Learn How To Split Terminal on backtrack 5 Learn how to use Armitage in Backtrack 5 Learn how to use chntpw on backtrack 5 LEARN HOW TO USE CISCO PACK ON BUGTRAQ - II Learn How to use ettercap on Backtrack 5 for hacking username and passwords Learn how to use Netstat Commands On Backtrack 5 Learn how to use nipper Learn How to work with Vim editor on Backtrack 5 Learn Linux Commands on Backtrack Environment Learn Netdiscover On Backtrack 5 Learn Pentbox On Backtrack 5 Learn Recoverjpeg on Backtrack 5 Learn samdump on backtrack 5 Learn TrueCrypt On Backtrack 5 LINUX NETWORKING COMMANDS ON BACKTRACK 5 linux OS LINUX PARTITION ON BACKTRACK 5 List-Urls On Backtrack 4 Load Balancing Detector On Backtrack 5 LOG REMOVER BLEACHBIT Lynis On Backtrack 5 Mac Tracker On Backtrack 5 macchanger on backtrack 5 Matriux Installation On hackingDNA Metaexploit Framework : Collecting Email Addresses Metasploit Framework With Basic Commands Meterpreter on Backtrack 5 mitre-cve on backtrack 5 MSF AUXILIARY SCANNING ON BACKTRACK 5 msf scanning on backtrack 5 nbtscan on backtrack 5 NESSUS ON BACKTRACK 5 Net Card Config Netcat : Learn how to create a instant chat session on Backtrack 5 netenum on backtrack 5 Netifera On Backtrack 5 NETMASK On Backtrack 5 NIKTO ON KALI LINUX Nmap Scanning On Backtrack 5 nmap smb script offensive security Oneko And Cowsay On BackTrack 5 OpenOffice On Backtrack 5 OpenVAS On Backtrack 5 Orion Browser History Dumper v1.0 Penetration Testing Pipal On Backtrack 5 PostgreSQL On Kali Linux Practice Session On Backtrack 5 PROTOS on backtrack 5 Reconnaissance Recover Kali Password Remote Desktop Connection Remote Desktop On Backtrack 5 Remote Desktop Sharing Removing Backdoor on Backtrack 5 Restrict Control Panel Restrict Registry Editor by Group Policies Rkhunter On Backtrack 5 router auditing tool Router Penetration Testing router security Safecopy On Backtrack 5 samba testing samrdump on backtrack 5 Scanning security auditing tool Shell Scripting On Kali Linux Shrink and Create Partition on Windows 7 Shutter On Backtrack 5 siege on backtrack 5 smb enumeration smb hacking Smbclient On Backtrack 5 Smtpscan On Backtrack 5 SMURF6 ON KALI LINUX Sniff Images on Backtrack 5 using Driftnet Snort On Backtrack 5 snurf6 Software Updates On Kali linux Spoof Your MAC Address on Backtrack 5 sql attack SSID ssldump on backtrack 5 sslstrip on backtrack 5 Start Backtrack 5 Without Startx Steam Locomotive On BackTrack5 Stop Bruteforce attack System Monitor On Backtrack 5 tcptraceroute on backtrack 5 Tctrace On Backtrack 5 TeamViewer On BackTrack 5 TELNET On Backtrack 5 Terminator On Backtrack 5 the Harvester On Backtrack 5 Things you should know about Backtrack Tweak Your System Settings On Backtrack 5 Tweak Your System Settings On Backtrack 5 Part 2 Unicornscan On BackTrack 5 Uniscan On Backtrack 5 urlcrazy on backtrack 5 urlsnarf on backtrack 5 WBOX on Backtrack 4 and 5 Weak points Web Httrack::Web Copier Websecurify On BackTrack5 Webshag On Backtrack 5 WEP CRACKING ON BACKTRACK 5 whatweb on backtrack 5 WHATWEB ON BUGTRAQ Wiffit (wafw00f): Firewall Detection Tool On Backtrack 5 wireshark Xpdf On Backtrack 5 xprobe2 on backtrack 5 Zenmap

Popular Posts