06-24-2013, 03:20 PM
simple-ducky didesain untuk membuat payload dan melakukan listener, sekarang simple-ducky versi 2.6 duck encoder,simple-duck support semua turunan debian (kali,ubuntu,linu mint),
simple-ducky kegunaaanya antara lain:
-membuat file executable
-membuat inject.bin
-melakukan listener (meterpreter/netcat)
-menggenerate list password custom
-crak password
dan silahkan dicoba fitur2 lainnya:
Dependencies ini akan otomatis terinstall saya penginstallan simple-duck
Apache2
Pure-FTPD
Nautilus
GNOME-Terminal
GIT
WGET
Burp Suite
Social Engineering Tool Kit (SE-Toolkit)
Metasploit
p7zip-full
john
dfu-programmer
openjdk-7-jre-headless
samdump2
bkhive
Download simple-duck DOWNLOAD
-Beri hak akses
chmod +x installer_v1.1.0_debian.sh
-Jalankan Installernya
-ikuti perintah2nya
-jalankan simple-duck
simple-duck
Menu Utama didalam simple-duck V1.1.0
1.Windows Reverse Shell Payloads
2.WiFi Attacks
3.Password Attacks
4.Linux & OS X Payloads
5.Forced Phishing & Web Attacks
6.Clean up the Encoder directory
7.Dependency Checker
8.FTP Server Setup/User Add
9.LM/NTLM Password Hasher
10.Site2lst Custom Wordlist Builder
11.Quit
Windows Reverse Shell Menu:
1.Persistence Reverse Shell (Win Vista/7 w/UAC)
2.Persistence Reverse Shell (Win Vista/7 w/o UAC)
3.Persistence Reverse Shell (Win 8 w/UAC)
4.Persistence Reverse Shell (Win 8 w/o UAC)
5.Windows Reverse Shell (No Download|W2K/XP)
6.Windows Reverse Shell (No Download|Win Vista/7 w/UAC)
7.Windows Reverse Shell (No Download|Win Vista/7 w/o UAC)
8.Windows Reverse Shell (No Download|Win 8 w/UAC)
9.Windows Reverse Shell (No Download|Win 8 w/o UAC)
10.Powershell Download & Execute (User Priv Shell|Win Vista/7)
11.Powershell Download & Execute (Admin Priv Shell|Win Vista/7 w/UAC)
12.Powershell Download & Execute (Admin Priv Shell|Win Vista/7 w/o UAC)
13.Powershell Download & Execute (User Priv Shell|Win 8)
14.Powershell Download & Execute (Admin Priv Shell|Win 8 w/UAC)
15.Powershell Download & Execute (Admin Priv Shell|Win 8 w/UAC)
16.Return to Main Menu
17.Quit
Menu Wifi Attack
1.WiFi Backdoor (Win Vista/7 w/UAC)
2.WiFi Backdoor (Win Vista/7 w/o UAC)
3.WiFi Backdoor (Win 8 w/UAC)
4.WiFi Backdoor (Win 8 w/o UAC)
5.WiFi Autoconnect (Designed for the WiFi Pineapple | Win Vista/7 w/UAC)
6.WiFi Autoconnect (Designed for the WiFi Pineapple | Win Vista/7 w/o UAC)
7.WiFi Autoconnect (Designed for the WiFi Pineapple | Win 8 w/UAC)
8.WiFi Autoconnect (Designed for the WiFi Pineapple | Win 8 w/o UAC)
9.Return to Main Menu
10.Quit
Password Attack Menu:
1.LM/NTLM Hash Dump From Live System w/UAC (Win Vista/7)
2.LM/NTLM Hash Dump From Live System w/o UAC (Win Vista/
3.LM/NTLM Hash Dump From Live System w/UAC (Win 8)
4.LM/NTLM Hash Dump From Live System w/o UAC (Win 8)
5.WiFi Acess Point Crediential Harvester (Win Vista/7 w/UAC)
6.WiFi Acess Point Crediential Harvester (Win Vista/7 w/o UAC)
7.WiFi Acess Point Crediential Harvester (Win 8 w/UAC)
8.WiFi Acess Point Crediential Harvester (Win 8 w/o UAC)
9.Return to Main Menu
10.Quit
Linux dan OS X menu:
1.OSX Reverse Shell
2.OSX Single User Mode Reverse Shell
3.Linux Reverse Shell
4.Return to Main Menu
5.Quit
Phising dan Web Attack
1.Local DNS Posioning | SE-Toolkit's Java Applet Attack (Win Vista/7 w/UAC )
2.Local DNS Posioning | SE-Toolkit's Java Applet Attack (Win Vista/7 w/o UAC
3.Local DNS Posioning | SE-Toolkit's Java Applet Attack (Win 8 w/UAC )
4.Local DNS Posioning | SE-Toolkit's Java Applet Attack (Win 8 w/o UAC )
5.Local DNS Posioning | Metasploit's Browser_Autopwn (Win Vista/7 w/UAC)
6.Local DNS Posioning | Metasploit's Browser_Autopwn (Win Vista/7 w/o UAC )
7.Local DNS Posioning | Metasploit's Browser_Autopwn (Win 8 w/UAC)
8.Local DNS Posioning | Metasploit's Browser_Autopwn (Win 8 w/o UAC)
9.Proxy in the Middle (PiTM) | Burp Suite Proxy (Win XP/Vista/7 No Admin Needed )
10.Proxy in the Middle (PiTM) | Burp Suite Proxy (Win 8 No Admin Needed )
11.Return to Main Menu
12.Quit
====================================================
Apabila sudah mendonwnloadnyaa
chmod +x installer_v1.1.0_debian.sh
![[Image: duck1.png]](https://3.bp.blogspot.com/-WjrsEOoqdrs/UbjVEUmJWPI/AAAAAAAABks/_hOyNtjRwbI/s1600/duck1.png)
Simple-Ducky telah Terinstall dan otomatis mengupdate depedenciesnya
![[Image: duck2.png]](https://3.bp.blogspot.com/-mrY_pLGPmWw/UbjV24DPQTI/AAAAAAAABk4/3VMH4eYgowg/s1600/duck2.png)
Sesuai prosedur penginstallan dibutuhkan pengupdatetan java SDK,pilih option 2
![[Image: duck3.png]](https://3.bp.blogspot.com/-bStoCXl-V5c/UbjWV7wSI0I/AAAAAAAABlA/o8SD6HKV_Hc/s1600/duck3.png)
Didalam penggunaan aplikasi ini kita memerlukan username dan password
disini saya menggunakan m4k4ssrh4ck3r
dan password *********
![[Image: duck4.png]](https://3.bp.blogspot.com/-I3s_zr9dXGc/UbjXR4oUjKI/AAAAAAAABlQ/yh9dzEuYmRs/s1600/duck4.png)
Setelah Selesai memasukan user dan pass
buka terminal baru
ftp 127.0.0.1
![[Image: duck5.png]](https://1.bp.blogspot.com/-FLWnd5-WFfo/UbjYQMAGSfI/AAAAAAAABlg/HAh90zow3Bc/s1600/duck5.png)
Buka terminal baru ketikkan = simple-ducky
![[Image: duck6.png]](https://1.bp.blogspot.com/-whIL5sbsTaM/UbjY6gAQQiI/AAAAAAAABlo/La9QX3RrVjE/s1600/duck6.png)
saya mencoba membuat windows reverse sheel payloads
saya pilih 3
![[Image: duck7.png]](https://4.bp.blogspot.com/-qShaZoTKWYM/UbjbHhUH7eI/AAAAAAAABl4/RK1Oin0vWus/s1600/duck7.png)
Disini kita masukkan account
username
password
port
Ip/Domain
Y
![[Image: duck8.png]](https://3.bp.blogspot.com/-rdWmC3q8f-8/UbjcGqe9kOI/AAAAAAAABmI/C19sRnMo9iU/s1600/duck8.png)
Payloads Telah Berhasil Kita Buat Dan disimpan di
/usr/share/ducky/encoder/
Selanjutnya terserah ente
![[Image: duck9.png]](https://3.bp.blogspot.com/-DR3evVKIDOg/Ubjc73PqQ9I/AAAAAAAABmU/y3CZxJYmwY0/s1600/duck9.png)
seelamat belajar
simple-ducky kegunaaanya antara lain:
-membuat file executable
-membuat inject.bin
-melakukan listener (meterpreter/netcat)
-menggenerate list password custom
-crak password
dan silahkan dicoba fitur2 lainnya:
Dependencies ini akan otomatis terinstall saya penginstallan simple-duck
Apache2
Pure-FTPD
Nautilus
GNOME-Terminal
GIT
WGET
Burp Suite
Social Engineering Tool Kit (SE-Toolkit)
Metasploit
p7zip-full
john
dfu-programmer
openjdk-7-jre-headless
samdump2
bkhive
Download simple-duck DOWNLOAD
-Beri hak akses
chmod +x installer_v1.1.0_debian.sh
-Jalankan Installernya
-ikuti perintah2nya
-jalankan simple-duck
simple-duck
Menu Utama didalam simple-duck V1.1.0
1.Windows Reverse Shell Payloads
2.WiFi Attacks
3.Password Attacks
4.Linux & OS X Payloads
5.Forced Phishing & Web Attacks
6.Clean up the Encoder directory
7.Dependency Checker
8.FTP Server Setup/User Add
9.LM/NTLM Password Hasher
10.Site2lst Custom Wordlist Builder
11.Quit
Windows Reverse Shell Menu:
1.Persistence Reverse Shell (Win Vista/7 w/UAC)
2.Persistence Reverse Shell (Win Vista/7 w/o UAC)
3.Persistence Reverse Shell (Win 8 w/UAC)
4.Persistence Reverse Shell (Win 8 w/o UAC)
5.Windows Reverse Shell (No Download|W2K/XP)
6.Windows Reverse Shell (No Download|Win Vista/7 w/UAC)
7.Windows Reverse Shell (No Download|Win Vista/7 w/o UAC)
8.Windows Reverse Shell (No Download|Win 8 w/UAC)
9.Windows Reverse Shell (No Download|Win 8 w/o UAC)
10.Powershell Download & Execute (User Priv Shell|Win Vista/7)
11.Powershell Download & Execute (Admin Priv Shell|Win Vista/7 w/UAC)
12.Powershell Download & Execute (Admin Priv Shell|Win Vista/7 w/o UAC)
13.Powershell Download & Execute (User Priv Shell|Win 8)
14.Powershell Download & Execute (Admin Priv Shell|Win 8 w/UAC)
15.Powershell Download & Execute (Admin Priv Shell|Win 8 w/UAC)
16.Return to Main Menu
17.Quit
Menu Wifi Attack
1.WiFi Backdoor (Win Vista/7 w/UAC)
2.WiFi Backdoor (Win Vista/7 w/o UAC)
3.WiFi Backdoor (Win 8 w/UAC)
4.WiFi Backdoor (Win 8 w/o UAC)
5.WiFi Autoconnect (Designed for the WiFi Pineapple | Win Vista/7 w/UAC)
6.WiFi Autoconnect (Designed for the WiFi Pineapple | Win Vista/7 w/o UAC)
7.WiFi Autoconnect (Designed for the WiFi Pineapple | Win 8 w/UAC)
8.WiFi Autoconnect (Designed for the WiFi Pineapple | Win 8 w/o UAC)
9.Return to Main Menu
10.Quit
Password Attack Menu:
1.LM/NTLM Hash Dump From Live System w/UAC (Win Vista/7)
2.LM/NTLM Hash Dump From Live System w/o UAC (Win Vista/
3.LM/NTLM Hash Dump From Live System w/UAC (Win 8)
4.LM/NTLM Hash Dump From Live System w/o UAC (Win 8)
5.WiFi Acess Point Crediential Harvester (Win Vista/7 w/UAC)
6.WiFi Acess Point Crediential Harvester (Win Vista/7 w/o UAC)
7.WiFi Acess Point Crediential Harvester (Win 8 w/UAC)
8.WiFi Acess Point Crediential Harvester (Win 8 w/o UAC)
9.Return to Main Menu
10.Quit
Linux dan OS X menu:
1.OSX Reverse Shell
2.OSX Single User Mode Reverse Shell
3.Linux Reverse Shell
4.Return to Main Menu
5.Quit
Phising dan Web Attack
1.Local DNS Posioning | SE-Toolkit's Java Applet Attack (Win Vista/7 w/UAC )
2.Local DNS Posioning | SE-Toolkit's Java Applet Attack (Win Vista/7 w/o UAC
3.Local DNS Posioning | SE-Toolkit's Java Applet Attack (Win 8 w/UAC )
4.Local DNS Posioning | SE-Toolkit's Java Applet Attack (Win 8 w/o UAC )
5.Local DNS Posioning | Metasploit's Browser_Autopwn (Win Vista/7 w/UAC)
6.Local DNS Posioning | Metasploit's Browser_Autopwn (Win Vista/7 w/o UAC )
7.Local DNS Posioning | Metasploit's Browser_Autopwn (Win 8 w/UAC)
8.Local DNS Posioning | Metasploit's Browser_Autopwn (Win 8 w/o UAC)
9.Proxy in the Middle (PiTM) | Burp Suite Proxy (Win XP/Vista/7 No Admin Needed )
10.Proxy in the Middle (PiTM) | Burp Suite Proxy (Win 8 No Admin Needed )
11.Return to Main Menu
12.Quit
====================================================
Apabila sudah mendonwnloadnyaa
chmod +x installer_v1.1.0_debian.sh
![[Image: duck1.png]](https://3.bp.blogspot.com/-WjrsEOoqdrs/UbjVEUmJWPI/AAAAAAAABks/_hOyNtjRwbI/s1600/duck1.png)
Simple-Ducky telah Terinstall dan otomatis mengupdate depedenciesnya

![[Image: duck2.png]](https://3.bp.blogspot.com/-mrY_pLGPmWw/UbjV24DPQTI/AAAAAAAABk4/3VMH4eYgowg/s1600/duck2.png)
Sesuai prosedur penginstallan dibutuhkan pengupdatetan java SDK,pilih option 2
![[Image: duck3.png]](https://3.bp.blogspot.com/-bStoCXl-V5c/UbjWV7wSI0I/AAAAAAAABlA/o8SD6HKV_Hc/s1600/duck3.png)
Didalam penggunaan aplikasi ini kita memerlukan username dan password
disini saya menggunakan m4k4ssrh4ck3r
dan password *********
![[Image: duck4.png]](https://3.bp.blogspot.com/-I3s_zr9dXGc/UbjXR4oUjKI/AAAAAAAABlQ/yh9dzEuYmRs/s1600/duck4.png)
Setelah Selesai memasukan user dan pass
buka terminal baru
ftp 127.0.0.1
![[Image: duck5.png]](https://1.bp.blogspot.com/-FLWnd5-WFfo/UbjYQMAGSfI/AAAAAAAABlg/HAh90zow3Bc/s1600/duck5.png)
Buka terminal baru ketikkan = simple-ducky
![[Image: duck6.png]](https://1.bp.blogspot.com/-whIL5sbsTaM/UbjY6gAQQiI/AAAAAAAABlo/La9QX3RrVjE/s1600/duck6.png)
saya mencoba membuat windows reverse sheel payloads
saya pilih 3
![[Image: duck7.png]](https://4.bp.blogspot.com/-qShaZoTKWYM/UbjbHhUH7eI/AAAAAAAABl4/RK1Oin0vWus/s1600/duck7.png)
Disini kita masukkan account
username
password
port
Ip/Domain
Y
![[Image: duck8.png]](https://3.bp.blogspot.com/-rdWmC3q8f-8/UbjcGqe9kOI/AAAAAAAABmI/C19sRnMo9iU/s1600/duck8.png)
Payloads Telah Berhasil Kita Buat Dan disimpan di
/usr/share/ducky/encoder/
Selanjutnya terserah ente

![[Image: duck9.png]](https://3.bp.blogspot.com/-DR3evVKIDOg/Ubjc73PqQ9I/AAAAAAAABmU/y3CZxJYmwY0/s1600/duck9.png)
seelamat belajar
The Wolf