Saturday, 31 December 2011

Say Cheese with Metasploit Meterpreter (Webcam Hack)..

This is a quick exploitation using SET (Social-Engineering Toolkit) framework that uses MSF (Metasploit Framework) to generate shellcodes and exploits.

We will be using MSF Meterpreter as Payload for webcam hack (webcam_snap).


Lets start with "set"..


A quick choice of website attacks that needs to be done.







Using a Java-Applet type of attack.

The Attackers IP : 192.168.169.128


Using DNS Spoofing, the traffic is redirected to www.google.com


Setting Meterpreter Payload









SET is loading MSF now..


Attacker server is ready and listening..

On Victim's host visit attackers server (site).






The "webcam_list" function in meterpreter guarantees, USB webcam device on victims host.






 Got a snap from victims host ... that's a morphed me.!








Jam it all on 802.11 (DeAuth-packet)


Be ready to take on everyone annoying you. ;P  just kidding !

Setup a BT machine to jam any channel that you dont want to be Live on wireless. The attack is actually De-Authentication packets sent to any channel, that would jam all the AP (Access Points) lying under that channel.

Download Jamming script : hxxp://code.google.com/p/wifijammer/

And It goes something like this..




Once the Monitor mode is enabled on wlan0 as mon0




Now the script is monitoring all the AP(s) using airmon-ng.



Entered the channel number to Jam :1


Thats all, your jammer is ON !!  ;)

Only results are motivational

I am all ready to start up with this so called "Sec blog", to share my experiences on "friendly hacking" practices. But might add-on some nice deep OS/kernel details with not so security background. 
You may find stuff like Pen-testing, Malware Analysis, R.E, Linux kernel Internals and some crazy interesting stuff on this blog.

A brief on me : I am just another hobbyist that want to take over on this world with some cruel intentions facilitated by W.M.D (computers)... muuhuhuhahaha..!

Enough said..  Lets get on with some not so evil stuff and execute our <Header-Content>.