Monday, 8 October 2012

keimpx on backtrack 5


KEIMPX 
KEIMPX ON BACKTRACK 5

INTRODUCTION
keimpx is an open source tool, released under a modified version of Apache License 1.1.
It can be used to quickly check for the usefulness of credentials across a network over SMB. Credentials can be:

  • Combination of user / plain-text password.
  • Combination of user / NTLM hash.
  • Combination of user / NTLM logon session token.

If any valid credentials has been discovered across the network after its attack phase, the user is asked to choose which host to connect to and which valid credentials to use, then he will be prompted with an interactive SMB shell where the user can:

  • Spawn an interactive command prompt.
  • Navigate through the remote SMB shares: list, upload, download files, create, remove files, etc.
  • Deploy and undeploy his own service, for instance, a backdoor listening on a TCP port for incoming connections.
  • List users details, domains and password policy.
HOW TO OPEN KEIMPX ON BACKTRACK  5 
  • To open keimpx , follow the path -
  • BackTrack > Priviledge Escalation > Password Attacks > Online Attacks > keimpx
  • See the below image for more help -

keimpx on backtrack 5

keimpx on backtrack 5

LOGGING TARGET MACHINE
  • In this step , you need the username and password then only you can successfully login to the target machine . 
  • Command Used : ./keimpx.py -t < target ip > -U < username > -P < password > 
  • See the below image for live example -
keimpx logged in

WANNA WINDOWS SHELL ON BACKTRACK 5 ?
  • Now it ask you --> Do you want to get a shell from any of the target ? [ Y/n ]
  • Always Press yes otherwise , if you enter no then the program will exit . 
  • See the below image for more details - 

SELECT TARGET  and CREDENTIALS 

  • In this step , it will ask you which target you want to connect to ? And which credentials do you want to use to connect ?
  • In my case there is only 1 target , but in real case senario it will show many targets . 
  • So according to my case , enter key 1 on both the query and press enter key .
  • See the below image for more details -
  • Now whenever you see # sign , it means you are " inn " keimpx and now you can use all the commands supported by keimpx . 


HELP COMMAND
  • Lets start with the help command .
  • This command display all the options supported by keimpx like -
  1. Generic Options 
  2. Shares Options
  3. Services Options
  4. Shell Options 
  5. Users Options
  6. Registry options 
  • See the below image for more help -  
help on keimpx


Info Command 
  • This command list the remote/target system information .
  • See the below image how to use this command -

SHARES
  • This command will display the available shares .
  • Command Used : shares 
  • As yoy press enter key , it display all the available shares and also ask you " which share do you want to connect to ?
  • See the below image for more details -
shares on keimpx

USE COMMAND 
  • This command is used to connect specific shares .
  • Command Syntax : use { sharename }
  • See the below image for  the example-
use on keimpx


ls command 
  • This command will list all the files and current directories .
  • See the below image for more details -
ls on keimpx

UPLOAD FILE
  • To upload file on remote/target machine , you can use the upload command .
  • Command Syntax : upload{ filename }
  • See the below image for more details -
upload on keimpx

DOWNLOAD FILE 
  • To download file from the remote/target machine , you can use the download command .
  • Command syntax : download { filename }
  • See the below image for more details -
download on keimpx

REMOVING FIL
  • To remove file from remote machine , we use the " rm command " .
  • Command Syntax : rm { filename }
  • See the below example to understand how to use remove command . 
removing file on keimpx

REMOVING DIRECTORY
  • Above you see how to remove the file , now here you learn how to remove directory from the remote /target machine through your Backtrack 5 .
  • Command Syntax : rmdir { directory-name }
  • See the below image for more details -
removing directory on keimpx

DOMAIN
  • List the domain which the system is part of.
  • See the below example for more help-
domain on keimpx

CAT COMMAND 
  • You can use command to view file . Here in my case I used cat command to view hackingDNA file .
  • See the below image for more details - 

WINDOWS SHELL 
  • To get the shell , enter the shell command .
  • Command Used : shell
  • See the below image as soon you enter the ' shell ' command it display the windows shell on backtrack 5 ( See the below image ) -

IPCONFIG COMMAND 


DIR COMMAND


USERS
  • It list the users .
  • Command Used : users 
  • See the below image for the output of this command -
users on keimpx

PASSWORD POLICY
  • List the password policy.
  • Command Used : pswpolicy
  • See the below image for the output -
pswpolicy on keimpx


EXIT COMMAND
  • At last " exit command " , it simply used to exit from the program or terminal .
  • See the below image for more details -
EXIT

  • Its a good tool developed by  Bernardo Damele .
  • Working with this tool had a great experience , A one small application gives you so much of information about your target . Isn't it great .
  • Many more things you can do " try it , learn it and gain it ". ,
  • I hope you like  it , if  yes come and join our facebook page 

JOIN US 
ON 
FACEBOOK 

THIS TUTORIAL IS JUST FOR EDUCATIONAL PURPOSE ONLY /- 

0 comments:

Categories

Angry IPScanner On Backtrack 4 Arduino Arduino Opensource community attacks on router auditing tool Aurora Exploiting Through Kali Linux AUTOSCAN ON BACKTRACK 5 BackBox Linux On hackingDNA Backtrack 5 : Linux Commands Backtrack Bootable Pendrive Backtrack Tool : The Harvester Blender On Backtrack 5 Block Command Prompt Browser Autopwn On Backtrack 5 BUGTRAQ LOG REMOVER BLEACHBIT chkrootkit on Backtrack 5 chntpw on backtrack 5 cisco switches routing auditing tool. Client Side Attack On Backtrack 5 Command Shell Upgrade On Backtrack 5 Conky On Backtrack 5 convert guest account into admin using chntpw in backtrack 5 Convert Jpg Image into Ascii on Backtrack 5 countermeasures Cracking Unix Password On Backtrack 5 Cupp On Backtrack 5 Cutycapt On Kali Linux Detect Sniffer6 On Kali Linux dmitry on backtrack 5 Dnmap On Kali Linux dnsenum on backtrack 5 dnsrecon on backtrack 5 dnstracer on backtrack 5 dnswalk on backtrack 5 DOMAIN TOOL ON BUGTRAQ Dos attack driftnet on backtrack 5 dsniff on backtrack 5 enum4linux esp8266 EtherApe On BackTrack 5 ewizard on backtrack 5 ExifTool On BackTrack 5 Exploit Distccd On BackTrack 5 Exploit RDP Vulnerability On Kali Linux Exploit Samba Server On Backtrack 5 fatback on backtrack 5 FERN CRACKER ON BACKTRACK 5 Fierce in Backtrack 5 findmyhash : Crack the hash on Backtrack 5 Firewalk-Script On BackTrack 5 Firewall On Backtrack 5 Flash Player On Backtrack 5 Genlist On Backtrack 5 Gerix Cracker On Backtrack 5 Get Your Data Back Golismero On BackTrack 5 GOOFILE ON BUGTRAQ Google Kung-Fu goohost on backtrack 5 Grendel-Scan On Backtrack 5 gtk-recordmydesktop on backtrack 5 HACK BACKTRACK 5 via RAT Hack The Database with Backtrack 5 Hack the Facebook with Backtrack 5 Hack the windows in GNS3 Hack Windows XP using Backtrack 5 Hack Windows Xp using msfconsole hacking Hacking Lab 01 Hacking Windows 7 USING Backtrack 5 hackingdna hackingDNA choice :Best Antivirus Detection honeyd on backtrack 5 honeypot on backtrack 5 HOW TO INSTALL REDHAT ENTERPRISE LINUX 5 How to block ICMP request How To Install CAINE How to Install Chromium Browser on Backtrack 5 How to Install Windows 7 Ultimate How To Install Xampp On Kali Linux How to make new User in Backtrack 5 How to see files and directories on Linux how to use arduino in kali linux How to use Host Command on Backtrack 5 How to use Nano Editor on Backtrack 5 How to use Ping Command on Backtrack How to use whois tool on Backtrack 5 hping2 on backtrack 5r2 Httprint On BackTrack 5 icmpv6 flooding attack ifconfig command Installing And Accessing Backdoor On Backtrack 5 Installing software on Backtrack 5 using apt-get ipcalc on backtrack 5 Itrace On BackTrack 5 Jigsaw On Backtrack 5 Joomscan On Backtrack 5 KALI ARMITAGE ON KALI LINUX kali linux kali linux arduino Kali Linux Installation Kali Rolling Release 2016.2 keimpx on backtrack 5 Lanmap On Backtrack 4 Learn arping on Backtrack 5 Learn Basic of Internet with DAWN OF THE NET Learn Basics if Screen Utility Learn cmospwd on Backtrack 5 Learn dnsdict6 on backtrack 5 Learn fping on Backtrack 5 Learn Help Utilities Command On Backtrack 5 Learn hexedit on Backtrack 5 Learn how to hack root account on REDHAT5 Learn How to Install Backtrack 5 Learn how to make Bootable Pendrive Learn how to split Terminal into different regions Learn How To Split Terminal on backtrack 5 Learn how to use Armitage in Backtrack 5 Learn how to use chntpw on backtrack 5 LEARN HOW TO USE CISCO PACK ON BUGTRAQ - II Learn How to use ettercap on Backtrack 5 for hacking username and passwords Learn how to use Netstat Commands On Backtrack 5 Learn how to use nipper Learn How to work with Vim editor on Backtrack 5 Learn Linux Commands on Backtrack Environment Learn Netdiscover On Backtrack 5 Learn Pentbox On Backtrack 5 Learn Recoverjpeg on Backtrack 5 Learn samdump on backtrack 5 Learn TrueCrypt On Backtrack 5 LINUX NETWORKING COMMANDS ON BACKTRACK 5 linux OS LINUX PARTITION ON BACKTRACK 5 List-Urls On Backtrack 4 Load Balancing Detector On Backtrack 5 LOG REMOVER BLEACHBIT Lynis On Backtrack 5 Mac Tracker On Backtrack 5 macchanger on backtrack 5 Matriux Installation On hackingDNA Metaexploit Framework : Collecting Email Addresses Metasploit Framework With Basic Commands Meterpreter on Backtrack 5 mitre-cve on backtrack 5 MSF AUXILIARY SCANNING ON BACKTRACK 5 msf scanning on backtrack 5 nbtscan on backtrack 5 NESSUS ON BACKTRACK 5 Net Card Config Netcat : Learn how to create a instant chat session on Backtrack 5 netenum on backtrack 5 Netifera On Backtrack 5 NETMASK On Backtrack 5 NIKTO ON KALI LINUX Nmap Scanning On Backtrack 5 nmap smb script offensive security Oneko And Cowsay On BackTrack 5 OpenOffice On Backtrack 5 OpenVAS On Backtrack 5 Orion Browser History Dumper v1.0 Penetration Testing Pipal On Backtrack 5 PostgreSQL On Kali Linux Practice Session On Backtrack 5 PROTOS on backtrack 5 Reconnaissance Recover Kali Password Remote Desktop Connection Remote Desktop On Backtrack 5 Remote Desktop Sharing Removing Backdoor on Backtrack 5 Restrict Control Panel Restrict Registry Editor by Group Policies Rkhunter On Backtrack 5 router auditing tool Router Penetration Testing router security Safecopy On Backtrack 5 samba testing samrdump on backtrack 5 Scanning security auditing tool Shell Scripting On Kali Linux Shrink and Create Partition on Windows 7 Shutter On Backtrack 5 siege on backtrack 5 smb enumeration smb hacking Smbclient On Backtrack 5 Smtpscan On Backtrack 5 SMURF6 ON KALI LINUX Sniff Images on Backtrack 5 using Driftnet Snort On Backtrack 5 snurf6 Software Updates On Kali linux Spoof Your MAC Address on Backtrack 5 sql attack SSID ssldump on backtrack 5 sslstrip on backtrack 5 Start Backtrack 5 Without Startx Steam Locomotive On BackTrack5 Stop Bruteforce attack System Monitor On Backtrack 5 tcptraceroute on backtrack 5 Tctrace On Backtrack 5 TeamViewer On BackTrack 5 TELNET On Backtrack 5 Terminator On Backtrack 5 the Harvester On Backtrack 5 Things you should know about Backtrack Tweak Your System Settings On Backtrack 5 Tweak Your System Settings On Backtrack 5 Part 2 Unicornscan On BackTrack 5 Uniscan On Backtrack 5 urlcrazy on backtrack 5 urlsnarf on backtrack 5 WBOX on Backtrack 4 and 5 Weak points Web Httrack::Web Copier Websecurify On BackTrack5 Webshag On Backtrack 5 WEP CRACKING ON BACKTRACK 5 whatweb on backtrack 5 WHATWEB ON BUGTRAQ Wiffit (wafw00f): Firewall Detection Tool On Backtrack 5 wireshark Xpdf On Backtrack 5 xprobe2 on backtrack 5 Zenmap

Popular Posts