Cara Install Simple-Duck Payloads Generator
#1
simple-ducky didesain untuk membuat payload dan melakukan listener, sekarang simple-ducky versi 2.6 duck encoder,simple-duck support semua turunan debian (kali,ubuntu,linu mint),

simple-ducky kegunaaanya antara lain:
-membuat file executable
-membuat inject.bin
-melakukan listener (meterpreter/netcat)
-menggenerate list password custom
-crak password
dan silahkan dicoba fitur2 lainnya:

Dependencies ini akan otomatis terinstall saya penginstallan simple-duck
Apache2
Pure-FTPD
Nautilus
GNOME-Terminal
GIT
WGET
Burp Suite
Social Engineering Tool Kit (SE-Toolkit)
Metasploit
p7zip-full
john
dfu-programmer
openjdk-7-jre-headless
samdump2
bkhive
Download simple-duck DOWNLOAD
-Beri hak akses
chmod +x installer_v1.1.0_debian.sh
-Jalankan Installernya
-ikuti perintah2nya
-jalankan simple-duck
simple-duck

Menu Utama didalam simple-duck V1.1.0
1.Windows Reverse Shell Payloads
2.WiFi Attacks
3.Password Attacks
4.Linux & OS X Payloads
5.Forced Phishing & Web Attacks
6.Clean up the Encoder directory
7.Dependency Checker
8.FTP Server Setup/User Add
9.LM/NTLM Password Hasher
10.Site2lst Custom Wordlist Builder
11.Quit

Windows Reverse Shell Menu:
1.Persistence Reverse Shell (Win Vista/7 w/UAC)
2.Persistence Reverse Shell (Win Vista/7 w/o UAC)
3.Persistence Reverse Shell (Win 8 w/UAC)
4.Persistence Reverse Shell (Win 8 w/o UAC)
5.Windows Reverse Shell (No Download|W2K/XP)
6.Windows Reverse Shell (No Download|Win Vista/7 w/UAC)
7.Windows Reverse Shell (No Download|Win Vista/7 w/o UAC)
8.Windows Reverse Shell (No Download|Win 8 w/UAC)
9.Windows Reverse Shell (No Download|Win 8 w/o UAC)
10.Powershell Download & Execute (User Priv Shell|Win Vista/7)
11.Powershell Download & Execute (Admin Priv Shell|Win Vista/7 w/UAC)
12.Powershell Download & Execute (Admin Priv Shell|Win Vista/7 w/o UAC)
13.Powershell Download & Execute (User Priv Shell|Win 8)
14.Powershell Download & Execute (Admin Priv Shell|Win 8 w/UAC)
15.Powershell Download & Execute (Admin Priv Shell|Win 8 w/UAC)
16.Return to Main Menu
17.Quit

Menu Wifi Attack
1.WiFi Backdoor (Win Vista/7 w/UAC)
2.WiFi Backdoor (Win Vista/7 w/o UAC)
3.WiFi Backdoor (Win 8 w/UAC)
4.WiFi Backdoor (Win 8 w/o UAC)
5.WiFi Autoconnect (Designed for the WiFi Pineapple | Win Vista/7 w/UAC)
6.WiFi Autoconnect (Designed for the WiFi Pineapple | Win Vista/7 w/o UAC)
7.WiFi Autoconnect (Designed for the WiFi Pineapple | Win 8 w/UAC)
8.WiFi Autoconnect (Designed for the WiFi Pineapple | Win 8 w/o UAC)
9.Return to Main Menu
10.Quit

Password Attack Menu:
1.LM/NTLM Hash Dump From Live System w/UAC (Win Vista/7)
2.LM/NTLM Hash Dump From Live System w/o UAC (Win Vista/
3.LM/NTLM Hash Dump From Live System w/UAC (Win 8)
4.LM/NTLM Hash Dump From Live System w/o UAC (Win 8)
5.WiFi Acess Point Crediential Harvester (Win Vista/7 w/UAC)
6.WiFi Acess Point Crediential Harvester (Win Vista/7 w/o UAC)
7.WiFi Acess Point Crediential Harvester (Win 8 w/UAC)
8.WiFi Acess Point Crediential Harvester (Win 8 w/o UAC)
9.Return to Main Menu
10.Quit

Linux dan OS X menu:
1.OSX Reverse Shell
2.OSX Single User Mode Reverse Shell
3.Linux Reverse Shell
4.Return to Main Menu
5.Quit
Phising dan Web Attack
1.Local DNS Posioning | SE-Toolkit's Java Applet Attack (Win Vista/7 w/UAC )
2.Local DNS Posioning | SE-Toolkit's Java Applet Attack (Win Vista/7 w/o UAC
3.Local DNS Posioning | SE-Toolkit's Java Applet Attack (Win 8 w/UAC )
4.Local DNS Posioning | SE-Toolkit's Java Applet Attack (Win 8 w/o UAC )
5.Local DNS Posioning | Metasploit's Browser_Autopwn (Win Vista/7 w/UAC)
6.Local DNS Posioning | Metasploit's Browser_Autopwn (Win Vista/7 w/o UAC )
7.Local DNS Posioning | Metasploit's Browser_Autopwn (Win 8 w/UAC)
8.Local DNS Posioning | Metasploit's Browser_Autopwn (Win 8 w/o UAC)
9.Proxy in the Middle (PiTM) | Burp Suite Proxy (Win XP/Vista/7 No Admin Needed )
10.Proxy in the Middle (PiTM) | Burp Suite Proxy (Win 8 No Admin Needed )
11.Return to Main Menu
12.Quit
====================================================
Apabila sudah mendonwnloadnyaa
chmod +x installer_v1.1.0_debian.sh
[Image: duck1.png]
Simple-Ducky telah Terinstall dan otomatis mengupdate depedenciesnya Big Grin
[Image: duck2.png]
Sesuai prosedur penginstallan dibutuhkan pengupdatetan java SDK,pilih option 2
[Image: duck3.png]
Didalam penggunaan aplikasi ini kita memerlukan username dan password
disini saya menggunakan m4k4ssrh4ck3r
dan password *********
[Image: duck4.png]
Setelah Selesai memasukan user dan pass
buka terminal baru
ftp 127.0.0.1
[Image: duck5.png]
Buka terminal baru ketikkan = simple-ducky
[Image: duck6.png]

saya mencoba membuat windows reverse sheel payloads
saya pilih 3
[Image: duck7.png]
Disini kita masukkan account
username
password
port
Ip/Domain
Y
[Image: duck8.png]
Payloads Telah Berhasil Kita Buat Dan disimpan di
/usr/share/ducky/encoder/
Selanjutnya terserah ente Big Grin
[Image: duck9.png]

seelamat belajar
The Wolf


Messages In This Thread




Users browsing this thread: 1 Guest(s)