This video is just a demonstration and Special Thanx to Max for acting as the victim and helping me making this video in real world. Making it FUD and undetectable is up to you. Now you can use that at any time because of DNS, it will be little similar to RATs. Once the victim opens the backdoor it back connects through the DNS to our IP successfully. Set LPORT to your forwarded port number and exploit. Set the LHOST to your internal IP which BT has been assigned. Now launch metasploit and use the multi/handler exploit which handles exploits outside the network. Those are things new we should modify in making our backdoor the rest are normal. Set the LPORT to your forwarded port for the BT machine. Set the LHOST to your no-ip domain, mine is (). Victim’s internal IP-> Victim’s external IP-> Attacker’s DNS->Attacker’s external IP-> Attacker’s Internal IP As the DUC client sends our External IP and updates our no-ip domain DNS is acting static. So here we use the payload as windows/meterpreter/reverse_tcp_dns in making our backdoor. Now open a terminal to your server using putty for example and login with the username and. Use a bridged connection in Network settings because we are going to add our BT machine to our internal IP Range. Next make sure you port forward you router to a new internal IP. tar -zxvf Go into the new folder created: cd noip-2.1.9-1 The version number in the folder name can change, so make sure to use the one corresponding to your extracted files. Simply put your domain name in the command, like so: noip-duc -g -u username -p password This will start the program and communication with our update servers. First of all create an account on No-IP and configure your DUC client correctly. noip-duc -g -u username -p password If you have the Plus Managed DNS service, you can also use the Linux DUC to update your personal domain, like. ![]() For that we can use a free domain name server such as No-IP. Victim’s internal IP->Victim’s external IP-> Attacker’s external IP-> Attacker’s Internal IPīut most of the time the Attacker’s External IP is Dynamic and changes. At the same time the opportunity was taken to clean up some. Within the Terminal window type the following commands below. mkdir /home/pi/noip cd /home/pi/noip After creating the directory folders for the DUC it is time to download the software. If necessary the chkconfig -level command option can be used to add/modify the run-level (s) the process is switched on for. In order to do so, open Terminal and type the following commands below. So a normal reverse_tcp connects like this. Add to the configuration and check the run-level: chkconfig -add noip2 chkconfig -list grep noip noip2 0:off 1:off 2:off 3:on 4:on 5:on 6:off. We use a DNS because our external IP changes every time.
0 Comments
Leave a Reply. |