Author Topic: Hacking on lan.  (Read 4014 times)

0 Members and 1 Guest are viewing this topic.

Offline IpLayer

  • NULL
  • Posts: 4
  • Cookies: -6
    • View Profile
Hacking on lan.
« on: November 02, 2013, 09:37:49 pm »
HI, I've Cracked some AP ,and I want to Access the Victim Pc..
So I tried metasploit ..and Preformed an nmap scan..
Code: [Select]
msf > nmap -sV -T4 -A -v -Pn 192.168.1.2
[*] exec: nmap -sV -T4 -A -v -Pn 192.168.1.2

Starting Nmap 6.40 ( [url=http://nmap.org]http://nmap.org[/url] ) at 2013-11-02 21:00  Standard Time
NSE: Loaded 110 scripts for scanning.
NSE: Script Pre-scanning.
Initiating ARP Ping Scan at 21:00
Scanning 192.168.1.2 [1 port]
Completed ARP Ping Scan at 21:00, 0.53s elapsed (1 total hosts)
Initiating Parallel DNS resolution of 1 host. at 21:00
Completed Parallel DNS resolution of 1 host. at 21:00, 0.00s elapsed
Initiating SYN Stealth Scan at 21:00
Scanning Ghazal-PC.Home (192.168.1.2) [1000 ports]
Discovered open port 443/tcp on 192.168.1.2
Discovered open port 80/tcp on 192.168.1.2
Completed SYN Stealth Scan at 21:00, 4.90s elapsed (1000 total ports)
Initiating Service scan at 21:00
Scanning 2 services on Ghazal-PC.Home (192.168.1.2)
Service scan Timing: About 50.00% done; ETC: 21:03 (0:01:44 remaining)
Completed Service scan at 21:02, 106.87s elapsed (2 services on 1 host)
Initiating OS detection (try #1) against Ghazal-PC.Home (192.168.1.2)
NSE: Script scanning 192.168.1.2.
Initiating NSE at 21:02
Completed NSE at 21:02, 20.30s elapsed
Nmap scan report for Ghazal-PC.Home (192.168.1.2)
Host is up (0.0069s latency).
Not shown: 998 filtered ports
PORT    STATE SERVICE VERSION
80/tcp  open  http?
|_http-title: Site doesn't have a title.
443/tcp open  skype2  Skype
|_http-title: Site doesn't have a title.
1 service unrecognized despite returning data. If you know the service/version,
please submit the following fingerprint at [url=http://www.insecure.org/cgi-bin/servicefp-submit.cgi]http://www.insecure.org/cgi-bin/servicefp-submit.cgi[/url] :
SF-Port80-TCP:V=6.40%I=7%D=11/2%Time=52754BC6%P=i686-pc-windows-windows%r(
SF:GetRequest,1A,"HTTP/1\.0\x20404\x20Not\x20Found\r\n\r\n")%r(HTTPOptions
SF:,3B,"\xc4\x9f\x0boo\xb1I\xf0}\xf7\x10\xb5zIg\xc2\xc4\x86\xf5\xa5\|\x88~
SF:\xda\x166\x05b\xc7\xd7\xdeu\x8d\|d_\xfd\xe2\xc1&\xec\xafW\x89\xba\xf9%I
SF:\xc6\xff\xa4\xc52{\xf0\xa1\^\xb7\xfc")%r(RTSPRequest,5F,"Y\x9c\xc5\xbc\
SF:xf6\xc8\xe60\xeecT\xf8\xd8\x86>\xad\xa2SI\xe4\xd4\(\xbdV\xc2\x8a\xea\xa
SF:0\x88o}l\x9a\x89\x15\xbf\x9d\xf9p\xad\x8bUa\x05k\x9en\xc4\xeb\xa0\x91\x
SF:8e'\xac-z#x\x89&\xdf\x04\xa5\x92\[P\x81\xbe\x97\\\x1d\xaa\x93\(yVO\xb4\
SF:x95\xc2\xcb\0q\xee\x07\x0c\r\xda\x03\xd8i\x86\xbfd\x85")%r(FourOhFourRe
SF:quest,1A,"HTTP/1\.0\x20404\x20Not\x20Found\r\n\r\n")%r(RPCCheck,37,"\xc
SF:8q/\xdc\x16v\xe3\xe3Q\xb5k\xc2\xae\x06\xd3\x08\x0e\x8e-Z\x9fcs\xc3\xc5C
SF:z\xf8\x16\x14\xacNo\xa2\x88~\x1d}4=\xbd\$\xf7\xc9\xa9`NF\xc01\xae\xc7\x
SF:cc\xcd\x9a")%r(DNSVersionBindReq,69,"\x91\x8e~\x02\xa1N\xacn\.I\xe0%\xe
SF:e\x13\xc0\x8c/\xe7B\x83#\x9eS\x8e4\xe8\xf5\xf9\x9fu\xc9\xf6\xb1\[K\xc3\
SF:xc7\xb7~b\x84\xdb\x134c\xae\*\x1ff\x1fD\xe5\xd2\x9b\x90\xc1\xfe\xd7\x9c
SF:\]\xea\xd3h\xb9\x96\x8f\xf4\xd5\x02\x0b@\xb1\.GLM\x1aC\x18\xa9\xc6\xff\
SF:xa4\xc52{\xf0\xa1\^\xb7\xfc=J\xb3\xc8\x99\xf6oT\xb5b\xeb\xa0\x91\x8e")%
SF:r(DNSStatusRequest,30,"m\x15\xe6\xca\x91y>\xe8\xb2n\xe0G\x10\xd5C\xa8\x
SF:9d\xd0\)&\xc8\xc0\xc4\xecn\x13\x83UA\xfb\xc9c\xc92\xb4Tj\+MD\x01\x0ejzE
SF:VV\xdc")%r(SSLSessionReq,43,"\x1b\x8f\$\xe4\xc2\x8e2\xd3\x8b#\xbd\x16\x
SF:86\xb9\xbbA\xbbBc\x8aOh\xc6\x8eC\xf7\xf5\x85\$;\x06M\x89'\x12t\x9e0c0\x
SF:cc\x1a\xea\xdf{G\xfa\xd8\xb8\xc9f\x1fD\xe5\xd2\x9b\x90\xc1\xfe\x8d\xec\
SF:xd6\xd8\x90\xd8\xf4-")%r(Kerberos,6C,"Z\x15\x02\x0f6\xcf\.\$8r\xacs\x01
SF:z\xffE>\xb7SsIuO\xe1\x14\x01\xe2Lk\xc3\xe3Y\$\xf3\xa14uT-\x90\x20\xdaE;
SF:z\xd3e\xc8\xa1\^\xb7\xfc=J\xb3\xc8\x99\xf6oT\xb5b\xeb\xa0\x91\x8e'\xac-
SF:z#x\x89&\xdf\x04\xa5\x92\[P\x81\xbe\x97\\\x1d\xaa\x93\(yVO\xb4\x95\xc2\
SF:xcb\0q\xee\x07\x0c\x1c\xaa\xc96\x94\xad\x9aB")%r(SMBProgNeg,5E,"\x8dz\+
SF:~L\x1c\x0e{\\'\xe3\x1fW\x88\^\$t\xd0\xc7\xd7-6\?\xcd\xfc\xbe\xf2`SX\x8d
SF:wa_\xa0\x18M>\xb6\xa7\xa8q\(r\xbf\xb0\xdac\xd8i\x86\xbfd\x85\xf2;\xb0a\
SF:x1ew\xbc\xfd\ns\x88Y\xb6/\x14u\"\xab`QN\xe7l\xed:\xe38I\xe6\x9f\xc4eR\x
SF:1b\x10A~W\x1c\xdd");
MAC Address: 02:08:E8:36:E7:C0 (Unknown)
Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
Device type: general purpose
Running: Microsoft Windows 2008|7|Vista
OS CPE: cpe:/o:microsoft:windows_server_2008::beta3 cpe:/o:microsoft:windows_7::-:professional cpe:/o:microsoft:windows_vista::- cpe:/o:microsoft:windows_vista::sp1
OS details: Microsoft Windows Server 2008 Beta 3, Microsoft Windows 7 Professional, Microsoft Windows Vista SP0 or SP1, Windows Server 2008 SP1, or Windows 7, Microsoft Windows Vista SP2, Windows 7 SP1, or Windows Server 2008
Uptime guess: 0.544 days (since Sat Nov 02 07:58:25 2013)
Network Distance: 1 hop
TCP Sequence Prediction: Difficulty=256 (Good luck!)
IP ID Sequence Generation: Incremental
TRACEROUTE
HOP RTT     ADDRESS
1   6.87 ms Ghazal-PC.Home (192.168.1.2)
NSE: Script Post-scanning.
Read data files from: D:\metasploit\nmap
OS and Service detection performed. Please report any incorrect results at [url=http://nmap.org/submit/]http://nmap.org/submit/[/url] .
Nmap done: 1 IP address (1 host up) scanned in 143.88 seconds
           Raw packets sent: 2044 (92.488KB) | Rcvd: 16 (780B)

Is the only Exploit in his System is caused by Skype?
What is the Next Step i Should Do(Since the autopwn was removed)?and How to take Advantage of this 2 opened Ports?
Thanks.

Staff note: [ code ] your stuff.
« Last Edit: November 03, 2013, 08:57:50 am by Kulverstukas »

Offline Maylo

  • NULL
  • Posts: 2
  • Cookies: 0
    • View Profile
Re: Hacking on lan.
« Reply #1 on: November 02, 2013, 09:46:40 pm »
you can search for a Dcom exploit and use the "use" command to inject it. set the rhost and then set a payload. After that you can set a localhost and use the exploit function. This will grand you CMD access assuming the lan pc is running on windows xp. Although it might work on newer releases of windows but I never tested it

Offline Snayler

  • Baron
  • ****
  • Posts: 812
  • Cookies: 135
    • View Profile
Re: Hacking on lan.
« Reply #2 on: November 02, 2013, 09:48:02 pm »
Next step: RTFM.
If you came here talking about autopwn, you need to read more about the tool you're using. Otherwise, trying to explain things to you would be just useless.

Offline Kulverstukas

  • Administrator
  • Zeus
  • *
  • Posts: 6627
  • Cookies: 542
  • Fascist dictator
    • View Profile
    • My blog
Re: Hacking on lan.
« Reply #3 on: November 03, 2013, 08:59:43 am »
LOL autopwn.
Also why are you attacking skype? that'll never work... try thinking out of the box.
His computer run windows and has netbios enabled... RTFM bro.

Offline IpLayer

  • NULL
  • Posts: 4
  • Cookies: -6
    • View Profile
Re: Hacking on lan.
« Reply #4 on: November 03, 2013, 01:53:57 pm »
Thanks 4 Great Welcoming.It's appreciated.
First i didn't say that i gonna hack Skype,I meant the Only 2 open Ports in his system ,
is 80 and 443,and this is skype Ports..
I don't need Open Ports ?
second,im not a Hacker I would like to learn to be one,but now i need Quick solution ,to hack this certain Device..
So if you can be So Generous ,Please Help me out ,and give me an Clues or Good link..
If you want me to Gain information ,Im ready..


Offline Snayler

  • Baron
  • ****
  • Posts: 812
  • Cookies: 135
    • View Profile
Re: Hacking on lan.
« Reply #5 on: November 03, 2013, 02:09:03 pm »
Thanks 4 Great Welcoming.It's appreciated.
First i didn't say that i gonna hack Skype,I meant the Only 2 open Ports in his system ,
is 80 and 443,and this is skype Ports..
I don't need Open Ports ?
second,im not a Hacker I would like to learn to be one,but now i need Quick solution ,to hack this certain Device..
So if you can be So Generous ,Please Help me out ,and give me an Clues or Good link..
If you want me to Gain information ,Im ready..
Actually, port 80 is HTTP port and port 443 is HTTPS port. There are no quick solutions, you learn or you don't. And no, you're obviously not ready.

Now, no one here is going to write a complete guide on how to use metasploit, so instead of begging for quick solutions, grab a book and start reading, because you're in way over your head.

Offline IpLayer

  • NULL
  • Posts: 4
  • Cookies: -6
    • View Profile
Re: Hacking on lan.
« Reply #6 on: November 03, 2013, 02:29:49 pm »
Thanks too ;D
Ok it's Over my head..
But can i find someone it's not over his head ?(then he will find a way in and manage this instantly)i Think.
and again i mean that skype is who using the Ports as nmap scan apparently shows..
and the service or Program who's running in the Port is the Important ,Right?
I mean in I'm ready ..that you ask me to run some commands ,And I'll tell you the Results,Not from my Experience.
Finally,Ok sorry my stupid Question,But you don't have to be so Polite ;)

LOL autopwn.
Also why are you attacking skype? that'll never work... try thinking out of the box.
His computer run windows and has netbios enabled... RTFM bro.
P.S the netbios method didn't Work cause he have a firewall and he turned off network discovery..and i can't see him in network..even i can't Ping his device..
Plus he don't share anything and there's no <20> value
and as you can see Port 139 isn't Open.
only IP scanner detect him.

Staff note: Try not to double post, there is a modify button. Use it.
 
« Last Edit: November 03, 2013, 02:50:45 pm by IpLayer »

Offline Kulverstukas

  • Administrator
  • Zeus
  • *
  • Posts: 6627
  • Cookies: 542
  • Fascist dictator
    • View Profile
    • My blog
Re: Hacking on lan.
« Reply #7 on: November 03, 2013, 05:05:09 pm »
as said above, RTFM.

Offline Resistor

  • Peasant
  • *
  • Posts: 65
  • Cookies: -10
    • View Profile
Re: Hacking on lan.
« Reply #8 on: November 08, 2013, 04:01:53 am »
The replies in this thread made me want to join the forums. It looks like knowledgeable people post here. I hope to contribute in some way. Cheers.

Offline Traitor4000

  • Knight
  • **
  • Posts: 191
  • Cookies: 8
    • View Profile
Re: Hacking on lan.
« Reply #9 on: November 08, 2013, 04:46:43 am »
Quote
i mean that skype is who using the Ports as nmap scan apparently shows..
Does anybody know what that even means!
« Last Edit: November 08, 2013, 04:47:10 am by Traitor4000 »
The most vulnerable part of an impenetrable system is those who believe it to be so.

Offline proxx

  • Avatarception
  • Global Moderator
  • Titan
  • *
  • Posts: 2803
  • Cookies: 256
  • ФФФ
    • View Profile
Re: Hacking on lan.
« Reply #10 on: November 08, 2013, 07:59:22 pm »
Does anybody know what that even means!
I have not a damn clue.
Close this soab.
Wtf where you thinking with that signature? - Phage.
This was another little experiment *evillaughter - Proxx.
Evilception... - Phage