Saturday, 28 November 2015

HACK THE WINDOWS IN GNS3




HACK THE WINDOWS | HACK THE NETWORK





INTRODUCTION
  • In this tutorial , you will learn how to hack widows .
  • How to create you own network .
  • The best thing of this hacking is no violation of any cyber law , because you are doing these illegal things in your own network .
  • This tutorial is just for education purpose or learning purpose.
  • The only thing you need is , you should have a knowledge of GNS3 (This is a advance tutorial).

CREATE NETWORK
  • First step  in this tutorial is creating a small network .
  • To create this network  the requirements are –
  • Two Routers
  • Two Switches
  • Two PC’s ( Backtrack 5 & Windows XP)
  • Connect networking devices with  Fast Ethernet cable and Serial cable as shown below .
  • Below you can see the design of my example network , see the below image for more details -


START THE NODES

START NODES

Now start your nodes by pressing the play button .
See the below image for more details – You will see our nodes are starting .
NOTE: When you start your GNS3 , it will use your maximum system Ram and CPU .This issue will slow down your PC .The solution of this problem is – to set the idle on your first router .

SET IDLE TIME
  • To set idle time right click on the Router1 (R1) and then it will automatically calculate the best idle time and showed to you.
  • What you have to do is click on apply and then press OK.


NETWORK IS READY FOR HACK
  • See the below image for more details -
  • Below you can see our virtual host(backtrack and windows xp) is ready.

CONFIGURE NETWORK
ON ROUTER 1
R1#config t
Enter configuration commands, one per line.  End with CNTL/Z.
R1(config)#int f1/1
R1(config-if)#ip add 10.0.0.1 255.0.0.0
R1(config-if)#no shut
R1(config-if)#exit
R1(config)#

CONFIGURE DHCP

R1(config)#ip dhcp pool hackingDNA
R1(dhcp-config)#network 10.0.0.0
R1(dhcp-config)#default-router 10.0.0.1
R1(dhcp-config)#dns-server 10.0.0.1
R1(dhcp-config)#exit
R1(config)#

CONFIGURE SERIAL INTERFACE

R1(config)#int s2/0
R1(config-if)#ip add 20.0.0.1 255.0.0.0
R1(config-if)#no shut
*Oct  3 21:25:00.675: %LINK-3-UPDOWN: Interface Serial2/0, changed state to up
*Oct  3 21:25:00.675: %ENTITY_ALARM-6-INFO: CLEAR INFO Se2/0 Physical Port Administrative State Down
*Oct  3 21:25:01.679: %LINEPROTO-5-UPDOWN: Line protocol on Interface Serial2/0, changed state to up
R1(config-if)#clock rate 64000
R1(config-if)#exit
R1(config)#

CONFIGURE STATIC  ROUTE
R1#config t
Enter configuration commands, one per line.  End with CNTL/Z.
R1(config)#ip route 30.0.0.0 255.0.0.0 20.0.0.2
R1(config)#exit
R1#
*Oct  3 21:33:55.163: %SYS-5-CONFIG_I: Configured from console by console
R1#

ON ROUTER 2
CONFIGURE  ROUTER IP

R2#config t
Enter configuration commands, one per line.  End with CNTL/Z.
R2(config)#int f1/1
R2(config-if)#ip add 30.0.0.1 255.0.0.0
R2(config-if)#no shut
R2(config-if)#exit
R2(config)#
*Oct  3 21:36:14.183: %LINK-3-UPDOWN: Interface FastEthernet1/1, changed state to up
R2(config)#
*Oct  3 21:36:14.183: %ENTITY_ALARM-6-INFO: CLEAR INFO Fa1/1 Physical Port Administrative State Down
*Oct  3 21:36:15.183: %LINEPROTO-5-UPDOWN: Line protocol on Interface FastEthernet1/1, changed state to up
R2(config)#

CONFIGURE DHCP

R2(config)#ip dhcp pool hackingDNA.com
R2(dhcp-config)#network 30.0.0.0
R2(dhcp-config)#default-router 30.0.0.1
R2(dhcp-config)#dns-server 30.0.0.1
R2(dhcp-config)#exit
R2(config)#

CONFIGURE SERIAL0/0

R2(config)#int s2/0
R2(config-if)#ip add 20.0.0.2 255.0.0.0
R2(config-if)#no shut
*Oct  3 21:40:41.775: %ENTITY_ALARM-6-INFO: CLEAR INFO Se2/0 Physical Port Administrative State Down
*Oct  3 21:40:42.775: %LINEPROTO-5-UPDOWN: Line protocol on Interface Serial2/0, changed state to up
R2(config-if)#exit
R2(config)#

CONFIGURE IP ROUTE
R2#config t
Enter configuration commands, one per line.  End with CNTL/Z.
R2(config)#ip route 10.0.0.0 255.0.0.0 20.0.0.1
R2(config)#exit
R2#
*Oct  3 21:42:35.859: %SYS-5-CONFIG_I: Configured from console by console
R2#


  • After the network is created , now check  its pinging or not .
  • So next step is ping your systems -
PING YOUR SYSTEMS
  • In the below image you can see  we  ping both of  our systems ( Linux & Windows ) .
  • Successful ping shows our network is properly working . And ready for next step .
  • See the below image to see  “ how to  ping” .

OPEN ARMITAGE  TO HACK WINDOWS
  • So, now  our network is  ready , its time to hack the windows.
  • On backtrack , open armitage.

QUICK SCAN 


ENTER THE SCAN RANGE OR SYSTEM IP

SCAN COMPLETE 


PERFORM ATTACK ANALYSIS 


EXPLOITING A WINDOWS VULNERABILITY
  • Now you are going to see what happen when a system will hacked in network .
  • Below image shows we are exploiting the windows netapi vulnerability .
  • See the below image for more details -

WINDOWS XP EXPLOITED
  • After exploiting , system color is changed into red.
  • See the below image file for more details -

BROWSE FILES
  • You can browse  windows xp files on Linux ( Backtrack ).
  • See the below image ,we show  you how it look like -


WINDOWS SHELL ( COMMAND PROMPT )  ON BACKTRACK 5
  • You can see the windows command prompt  on backtrack 5 .
  • See the below image , on backtrack 5 machine , it shows the windows ip address information .

METERPRETER  SHELL
  • In the meterpreter shell , you will get  information like –
SYSTEM INFORMATION
  1. Below  you will see the windows  information such as –
  2. Computer name
  3. OS name
  4. Architechture
See the below image for more details -

IDLE TIME 
  • In meterpreter shell , you can see the remote system idle time .
  • Below image shows that windows xp user is idle for 1 min 53 secs.
  • See the below image for more details -

GETDESKTOP


HASHDUMP
  • Through meterpreter shell , you will also get the hashes of windows xp users 
  • See the below image , it shows the hashes by just one command - hashdump.
  • See the below image for more details -
GETUID

GETPRIVS


ROUTE INFORMATION 

If you run route command on meterpreter shell , it will show the information like:
  1. Subnets ,
  2. Netmask ,
  3. Gateway,
  4. Metric ,
  5. Interfaces.
See the below image for more details -


WINDOWS DESKTOP SCREENSHOT

  • You can also take a screenshot of a hacked PC .
  • See the below image for more details -

AT THE END 
  • The above images shows what happen when your system is hacked .
  • What a hacker can do , if he is able to hack your system .
  • I hope you learn so many things from this tutorial .
  • Now Upgrade your old windows XP systems with Windows 7 or 8.
  • Keep following www.hackingdna.com NETWORKING section . 

THIS TUTORIAL IS JUST FOR EDUCATIONAL PURPOSE ONLY /- 

3 comments:

HackersTreeHouse said...

Hey Thanks Man For This Tutorial !!

Laouichi Yassin said...
This comment has been removed by the author.
Laouichi Yassin said...

nice tutorial thanks

Categories

Angry IPScanner On Backtrack 4 Arduino Arduino Opensource community attacks on router auditing tool Aurora Exploiting Through Kali Linux AUTOSCAN ON BACKTRACK 5 BackBox Linux On hackingDNA Backtrack 5 : Linux Commands Backtrack Bootable Pendrive Backtrack Tool : The Harvester Blender On Backtrack 5 Block Command Prompt Browser Autopwn On Backtrack 5 BUGTRAQ LOG REMOVER BLEACHBIT chkrootkit on Backtrack 5 chntpw on backtrack 5 cisco switches routing auditing tool. Client Side Attack On Backtrack 5 Command Shell Upgrade On Backtrack 5 Conky On Backtrack 5 convert guest account into admin using chntpw in backtrack 5 Convert Jpg Image into Ascii on Backtrack 5 countermeasures Cracking Unix Password On Backtrack 5 Cupp On Backtrack 5 Cutycapt On Kali Linux Detect Sniffer6 On Kali Linux dmitry on backtrack 5 Dnmap On Kali Linux dnsenum on backtrack 5 dnsrecon on backtrack 5 dnstracer on backtrack 5 dnswalk on backtrack 5 DOMAIN TOOL ON BUGTRAQ Dos attack driftnet on backtrack 5 dsniff on backtrack 5 enum4linux esp8266 EtherApe On BackTrack 5 ewizard on backtrack 5 ExifTool On BackTrack 5 Exploit Distccd On BackTrack 5 Exploit RDP Vulnerability On Kali Linux Exploit Samba Server On Backtrack 5 fatback on backtrack 5 FERN CRACKER ON BACKTRACK 5 Fierce in Backtrack 5 findmyhash : Crack the hash on Backtrack 5 Firewalk-Script On BackTrack 5 Firewall On Backtrack 5 Flash Player On Backtrack 5 Genlist On Backtrack 5 Gerix Cracker On Backtrack 5 Get Your Data Back Golismero On BackTrack 5 GOOFILE ON BUGTRAQ Google Kung-Fu goohost on backtrack 5 Grendel-Scan On Backtrack 5 gtk-recordmydesktop on backtrack 5 HACK BACKTRACK 5 via RAT Hack The Database with Backtrack 5 Hack the Facebook with Backtrack 5 Hack the windows in GNS3 Hack Windows XP using Backtrack 5 Hack Windows Xp using msfconsole hacking Hacking Lab 01 Hacking Windows 7 USING Backtrack 5 hackingdna hackingDNA choice :Best Antivirus Detection honeyd on backtrack 5 honeypot on backtrack 5 HOW TO INSTALL REDHAT ENTERPRISE LINUX 5 How to block ICMP request How To Install CAINE How to Install Chromium Browser on Backtrack 5 How to Install Windows 7 Ultimate How To Install Xampp On Kali Linux How to make new User in Backtrack 5 How to see files and directories on Linux how to use arduino in kali linux How to use Host Command on Backtrack 5 How to use Nano Editor on Backtrack 5 How to use Ping Command on Backtrack How to use whois tool on Backtrack 5 hping2 on backtrack 5r2 Httprint On BackTrack 5 icmpv6 flooding attack ifconfig command Installing And Accessing Backdoor On Backtrack 5 Installing software on Backtrack 5 using apt-get ipcalc on backtrack 5 Itrace On BackTrack 5 Jigsaw On Backtrack 5 Joomscan On Backtrack 5 KALI ARMITAGE ON KALI LINUX kali linux kali linux arduino Kali Linux Installation Kali Rolling Release 2016.2 keimpx on backtrack 5 Lanmap On Backtrack 4 Learn arping on Backtrack 5 Learn Basic of Internet with DAWN OF THE NET Learn Basics if Screen Utility Learn cmospwd on Backtrack 5 Learn dnsdict6 on backtrack 5 Learn fping on Backtrack 5 Learn Help Utilities Command On Backtrack 5 Learn hexedit on Backtrack 5 Learn how to hack root account on REDHAT5 Learn How to Install Backtrack 5 Learn how to make Bootable Pendrive Learn how to split Terminal into different regions Learn How To Split Terminal on backtrack 5 Learn how to use Armitage in Backtrack 5 Learn how to use chntpw on backtrack 5 LEARN HOW TO USE CISCO PACK ON BUGTRAQ - II Learn How to use ettercap on Backtrack 5 for hacking username and passwords Learn how to use Netstat Commands On Backtrack 5 Learn how to use nipper Learn How to work with Vim editor on Backtrack 5 Learn Linux Commands on Backtrack Environment Learn Netdiscover On Backtrack 5 Learn Pentbox On Backtrack 5 Learn Recoverjpeg on Backtrack 5 Learn samdump on backtrack 5 Learn TrueCrypt On Backtrack 5 LINUX NETWORKING COMMANDS ON BACKTRACK 5 linux OS LINUX PARTITION ON BACKTRACK 5 List-Urls On Backtrack 4 Load Balancing Detector On Backtrack 5 LOG REMOVER BLEACHBIT Lynis On Backtrack 5 Mac Tracker On Backtrack 5 macchanger on backtrack 5 Matriux Installation On hackingDNA Metaexploit Framework : Collecting Email Addresses Metasploit Framework With Basic Commands Meterpreter on Backtrack 5 mitre-cve on backtrack 5 MSF AUXILIARY SCANNING ON BACKTRACK 5 msf scanning on backtrack 5 nbtscan on backtrack 5 NESSUS ON BACKTRACK 5 Net Card Config Netcat : Learn how to create a instant chat session on Backtrack 5 netenum on backtrack 5 Netifera On Backtrack 5 NETMASK On Backtrack 5 NIKTO ON KALI LINUX Nmap Scanning On Backtrack 5 nmap smb script offensive security Oneko And Cowsay On BackTrack 5 OpenOffice On Backtrack 5 OpenVAS On Backtrack 5 Orion Browser History Dumper v1.0 Penetration Testing Pipal On Backtrack 5 PostgreSQL On Kali Linux Practice Session On Backtrack 5 PROTOS on backtrack 5 Reconnaissance Recover Kali Password Remote Desktop Connection Remote Desktop On Backtrack 5 Remote Desktop Sharing Removing Backdoor on Backtrack 5 Restrict Control Panel Restrict Registry Editor by Group Policies Rkhunter On Backtrack 5 router auditing tool Router Penetration Testing router security Safecopy On Backtrack 5 samba testing samrdump on backtrack 5 Scanning security auditing tool Shell Scripting On Kali Linux Shrink and Create Partition on Windows 7 Shutter On Backtrack 5 siege on backtrack 5 smb enumeration smb hacking Smbclient On Backtrack 5 Smtpscan On Backtrack 5 SMURF6 ON KALI LINUX Sniff Images on Backtrack 5 using Driftnet Snort On Backtrack 5 snurf6 Software Updates On Kali linux Spoof Your MAC Address on Backtrack 5 sql attack SSID ssldump on backtrack 5 sslstrip on backtrack 5 Start Backtrack 5 Without Startx Steam Locomotive On BackTrack5 Stop Bruteforce attack System Monitor On Backtrack 5 tcptraceroute on backtrack 5 Tctrace On Backtrack 5 TeamViewer On BackTrack 5 TELNET On Backtrack 5 Terminator On Backtrack 5 the Harvester On Backtrack 5 Things you should know about Backtrack Tweak Your System Settings On Backtrack 5 Tweak Your System Settings On Backtrack 5 Part 2 Unicornscan On BackTrack 5 Uniscan On Backtrack 5 urlcrazy on backtrack 5 urlsnarf on backtrack 5 WBOX on Backtrack 4 and 5 Weak points Web Httrack::Web Copier Websecurify On BackTrack5 Webshag On Backtrack 5 WEP CRACKING ON BACKTRACK 5 whatweb on backtrack 5 WHATWEB ON BUGTRAQ Wiffit (wafw00f): Firewall Detection Tool On Backtrack 5 wireshark Xpdf On Backtrack 5 xprobe2 on backtrack 5 Zenmap

Popular Posts