This is a quick exploitation using SET (Social-Engineering Toolkit) framework that uses MSF (Metasploit Framework) to generate shellcodes and exploits.
We will be using MSF Meterpreter as Payload for webcam hack (webcam_snap).
Lets start with "set"..
A quick choice of website attacks that needs to be done.
Using a Java-Applet type of attack.
The Attackers IP : 192.168.169.128
Using DNS Spoofing, the traffic is redirected to www.google.com
Setting Meterpreter Payload
SET is loading MSF now..
Attacker server is ready and listening..
On Victim's host visit attackers server (site).
The "webcam_list" function in meterpreter guarantees, USB webcam device on victims host.
We will be using MSF Meterpreter as Payload for webcam hack (webcam_snap).
Lets start with "set"..
A quick choice of website attacks that needs to be done.
Using a Java-Applet type of attack.
The Attackers IP : 192.168.169.128
Using DNS Spoofing, the traffic is redirected to www.google.com
Setting Meterpreter Payload
SET is loading MSF now..
Attacker server is ready and listening..
On Victim's host visit attackers server (site).
The "webcam_list" function in meterpreter guarantees, USB webcam device on victims host.
| Got a snap from victims host ... that's a morphed me.! |















Nice Work. Keep it up,
ReplyDeleteactually this video is also good. I mean i learned lots things about meterpreter. Maybe you like it
http://www.securitytube.net/video/2637
HaPPY Hacking