21.04.2015

msf+etter+beef

Scheduling:
00:12 Setting IP to 192.168.2..254/24
00:40 Starting BEEF (XSSF)
01:22 Injecting BEEF into a prepared website
02:07 Generating a meterpreter backdoor
03:28 Preparing metasploit multi/handler
04:36 Starting metasploit multi/handler
04:59 Placing the meterpreter backdoor into the prepared website
05:37 Setting the redirect address to 192.168.2.254 ( * - all dns requests)
06:27 Running XPLICO
07:45 DNS spoofing with ettercap (exclude own IP)
Network monitoring:
10:23 XPLICO
10:30 Client hooking into BEEF
Exploitation:
10:46 Meterpreter session
11:22 Cleaning DNS cache of the client
12:06 Privilege escalation via meterpreter
12:22 Cleaning ARP cache
Client:
_________________________________________________
09:33 DNS spoofed client
10:00 Downloading and executing fake update (meterpreter backdoor)
11:48 Websites after "update" available again