Hack windows 7 dns spoofing + S.E.T + ettercap
#1
izin share yaa.. vidio tutorial cupu buatan ane, disini saya make backbox linux, hampir tdk ada bedanya dengan backtrack, hanya saja lokasi S.E.T berata di /opt/set/ sedangkan di backtrack berada di /pentest/exploits/set/. Smile


#2
(04-13-2012, 03:35 AM)snail_venom Wrote: izin share yaa.. vidio tutorial cupu buatan ane, disini saya make backbox linux, hampir tdk ada bedanya dengan backtrack, hanya saja lokasi S.E.T berata di /opt/set/ sedangkan di backtrack berada di /pentest/exploits/set/. Smile



om..bagi dong teritorial agar bisa langsung pratekkannAngel

#3
(07-12-2012, 10:12 PM)pong Wrote:
(04-13-2012, 03:35 AM)snail_venom Wrote: izin share yaa.. vidio tutorial cupu buatan ane, disini saya make backbox linux, hampir tdk ada bedanya dengan backtrack, hanya saja lokasi S.E.T berata di /opt/set/ sedangkan di backtrack berada di /pentest/exploits/set/. Smile



om..bagi dong teritorial agar bisa langsung pratekkannAngel

klo ubuntu 12.04 bsa tdk ?
trus S.E.T nya ada dmn? krn blum tau banyak tentang ubuntu, jadi takut ngacak2 isinyaTongue
"lawan yang hitam dengan yang putih"
pengguna
linux tidak selamanya hacker yang jahat

#4
mau nanya nih om ...ini apa di dalam satu jaringan? kalo ga di dalam satu jaringan bisa apa ga om...gunain ini? mohon bimbingan nya om masih polosss BT

#5
thx tutorial.y om...
langsung k TKP .... Big Grin Big Grin Big Grin
lheytoz@IBTeam:~#

#6
(07-13-2012, 01:59 AM)beginer Wrote:
(07-12-2012, 10:12 PM)pong Wrote:
(04-13-2012, 03:35 AM)snail_venom Wrote: izin share yaa.. vidio tutorial cupu buatan ane, disini saya make backbox linux, hampir tdk ada bedanya dengan backtrack, hanya saja lokasi S.E.T berata di /opt/set/ sedangkan di backtrack berada di /pentest/exploits/set/. Smile



om..bagi dong teritorial agar bisa langsung pratekkannAngel

klo ubuntu 12.04 bsa tdk ?
trus S.E.T nya ada dmn? krn blum tau banyak tentang ubuntu, jadi takut ngacak2 isinyaTongue

ubuntu nya pakai repo apa?kalau repo backtrack biasanya posisinya sama
di /pentest/exploits/set

soalnya saya pernah menambahkan repo backtrack dan tools" nya ke linux minth 13(base on ubuntu 12.04) dan posisi nya sama

#7
buat om-om brother bantu dong prmlshn in
stlh mengisi port, mala kluar eror gini bro

set:payloads> PORT of the listener [443]:4444
ruby: no Ruby script found in input (LoadError)
[*] Generating x64-based powershell injection code...
/bin/sh: /pentest/exploits/framework2/msfvenom: No such file or directory
[*] Generating x86-based powershell injection code...
/bin/sh: /pentest/exploits/framework2/msfvenom: No such file or directory
[*] Finished generating shellcode powershell injection attack and is encoded to bypass execution restriction policys...
[-] Encoding the payload 4 times to get around pesky Anti-Virus. [-]

ruby: no Ruby script found in input (LoadError)
[*] Generating OSX payloads through Metasploit...
[*] Generating Linux payloads through Metasploit...
[*] Apache appears to be running, moving files into Apache's home

***************************************************
Web Server Launched. Welcome to the SET Web Attack.
***************************************************

[--] Tested on IE6, IE7, IE8, IE9, Safari, Opera, Chrome, and FireFox [--]
[--] Apache web server is currently in use for performance. [--]
[-] Launching MSF Listener...
[-] This may take a few to load MSF...
/usr/bin/ruby: no Ruby script found in input (LoadError)

Press [return] when finished.


mohon pencerahannya
satu lagi om yang di pertanyakan, bole dilihat konfigurasi file config/set_config
spya bisa di bandingkan dngn pnyaku

#8
kalo facebook paake https pengaruh ga ka?






Users browsing this thread: 1 Guest(s)