EvilZone
Hacking and Security => Hacking and Security => : L0rd_M@dness February 25, 2013, 02:23:45 PM
-
Hi,
So I'm writing this a malware which gives the hacker a simple shell access to another computer. Now I'm trying to make it spread itself into a network of windows machines. By network I mean a bunch of computers connected to the same modem with LAN / Wifi. Their IP addresses are also in line.
Does anyone know about a vulnaribility which can let me do that? Or do I really need a vulnaribility at all?
-
Check this website out, web.nvd.nist.gov/view/cpe/search (http://web.nvd.nist.gov/view/cpe/search).
Just search for something like, windows network, and maybe you'll find something.
But I'm not really an expert in this field.
-
You'd better stick to spreading trough social engineering, and drive-by's.
-
You'd better stick to spreading trough social engineering, and drive-by's.
why? Please share your precious info factionwars! :)
The windows machines I'm talking about are NOT updated so are possibly vulnerable to a bunch of exploits.
-
hate to spam but can somebody talk to me a bit more about this? Google didn't help much
-
Because that would essentially be a worm.
Releasing worms out on the internet is something that gets you caught.
And in that case just take a tour in metasploit, thats pretty much all you need.
-
Because that would essentially be a worm.
Releasing worms out on the internet is something that gets you caught.
And in that case just take a tour in metasploit, thats pretty much all you need.
A curious hacker doesn't care about the law. It's the thirst for knowledge that drives him.
Metasploit has millions of exploits on it. How can I find the ones that relate to network spread?
-
A curious hacker doesn't care about the law. It's the thirst for knowledge that drives him.
Metasploit has millions of exploits on it. How can I find the ones that relate to network spread?
Google through exploit-db.com andere csv vuln database. For Most good CSV vulns there are meta split implementations. So you will need a target network. A weak target like a specific router and take that as the beginning. Then from there spread through drive by's. And of course a good virus can update itself:)