Video: From XSS to a Fully Compromised Remote System

June 24, 2016 | Views: 9877

Begin Learning Cyber Security for FREE Now!

FREE REGISTRATIONAlready a Member Login Here

From XSS to pwnage of a remote system, the video below will demonstrate how BeEF, a payload and a little knowledge can lead to the compromise of a remote system and distribution of a payload through a web server.

 

Got a question? Let’s continue the conversation in the comments section.

Share with Friends
FacebookTwitterLinkedInEmail
Use Cybytes and
Tip the Author!
Join
Share with Friends
FacebookTwitterLinkedInEmail
Ready to share your knowledge and expertise?
23 Comments
  1. Hi, I am a beginner and there are many things I don’t understand in the video:

    How do you install python PGen? and why in /opt? Why to generate a payload with PGen and after create one with meterpreter?
    Why your payload is named done.exe? and why is it directly in opt/PGen/?
    After everything is very clear,

    Thanks for your answer and for sharing!!

    • Hi Maetis,

      There is a lot you must learn about linux file system, but ok let me give some answers.
      I did not install PGen.py this i python script i made to generate FUD(not detectable) payloads and then i use multi/handler in metasploit just to listen on any connection back.The name of the payload can be anything , so done.exe is just an example , could be 123.exe or whatever.
      It is directly in opt/PGen because the script place the generated payload inside the working folder(in my case opt/PGen)

      Hope that helps

  2. Thanks for sharing!

Page 4 of 4«1234
Comment on This

You must be logged in to post a comment.

Our Revolution

We believe Cyber Security training should be free, for everyone, FOREVER. Everyone, everywhere, deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is a free community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

Support Cybrary

Donate Here to Get This Month's Donor Badge

 

We recommend always using caution when following any link

Are you sure you want to continue?

Continue
Cancel