Saturday 4 January 2014

Facebook complete Hacking 3

12. In attacker computer if there’s any vulnerability in victim computer browser it will return sessions value that mean the exploit successfully attacking victim computer. In this case the exploit create new fake process named "Notepad.exe".
15 Steps to Hacking Windows Using Social Engineering Toolkit and Backtrack 5
15 Steps to Hacking Windows Using Social Engineering Toolkit and Backtrack 5
13. To view active sessions that already opened by the exploit type "sessions -l" for listing an active sessions. Take a look to the ID…we will use that ID to connect to victim computer.
15 Steps to Hacking Windows Using Social Engineering Toolkit and Backtrack 5
14. To interract and connect to victim computer use command "sessions -i ID". ID is numerical value that given when you do sessions -l. For example you can see example in picture below.
15 Steps to Hacking Windows Using Social Engineering Toolkit and Backtrack 5
15. Victim computer already owned. :-)
15 Steps to Hacking Windows Using Social Engineering Toolkit and Backtrack 5
I’m practice to create this tutorial using Virtual Machine so it will not harm other computer and also you can doing a lot of experience with your OS.

Countermeasure :

1. Don’t trust to unknown link
2. Use personal firewall to detect inbound and outbound traffic
Hope you enjoy it :-)