hacking & security – das umfassende handbuch · Î y -m Î Àtj y77 ª-j { a 6Î m 6 vty...
TRANSCRIPT
![Page 1: Hacking & Security – Das umfassende Handbuch · Î y -m Î Àtj y77 ª-j { a 6Î m 6 vty -mm-*oejftfn,bqjufmtufmmfoxjs*iofo esfj(fsÊufwps ejftphfoboouf,fztusplf *okfd ujpo "ohsjggffsnÚhmjdifo](https://reader033.vdocuments.pub/reader033/viewer/2022051911/6002391e85f33271374b0455/html5/thumbnails/1.jpg)
![Page 2: Hacking & Security – Das umfassende Handbuch · Î y -m Î Àtj y77 ª-j { a 6Î m 6 vty -mm-*oejftfn,bqjufmtufmmfoxjs*iofo esfj(fsÊufwps ejftphfoboouf,fztusplf *okfd ujpo "ohsjggffsnÚhmjdifo](https://reader033.vdocuments.pub/reader033/viewer/2022051911/6002391e85f33271374b0455/html5/thumbnails/2.jpg)
![Page 3: Hacking & Security – Das umfassende Handbuch · Î y -m Î Àtj y77 ª-j { a 6Î m 6 vty -mm-*oejftfn,bqjufmtufmmfoxjs*iofo esfj(fsÊufwps ejftphfoboouf,fztusplf *okfd ujpo "ohsjggffsnÚhmjdifo](https://reader033.vdocuments.pub/reader033/viewer/2022051911/6002391e85f33271374b0455/html5/thumbnails/3.jpg)
![Page 4: Hacking & Security – Das umfassende Handbuch · Î y -m Î Àtj y77 ª-j { a 6Î m 6 vty -mm-*oejftfn,bqjufmtufmmfoxjs*iofo esfj(fsÊufwps ejftphfoboouf,fztusplf *okfd ujpo "ohsjggffsnÚhmjdifo](https://reader033.vdocuments.pub/reader033/viewer/2022051911/6002391e85f33271374b0455/html5/thumbnails/4.jpg)
Malware herunterladen
Angreifer
Opfer
Digispark-Skript
192.168.0.11
Windows 7192.168.0.88
Mimikatz-Skript
Passworte übermitteln
Malwareübertragen
Passworteabgreifen
Webserver(php)
2
4
3
15
![Page 5: Hacking & Security – Das umfassende Handbuch · Î y -m Î Àtj y77 ª-j { a 6Î m 6 vty -mm-*oejftfn,bqjufmtufmmfoxjs*iofo esfj(fsÊufwps ejftphfoboouf,fztusplf *okfd ujpo "ohsjggffsnÚhmjdifo](https://reader033.vdocuments.pub/reader033/viewer/2022051911/6002391e85f33271374b0455/html5/thumbnails/5.jpg)
![Page 6: Hacking & Security – Das umfassende Handbuch · Î y -m Î Àtj y77 ª-j { a 6Î m 6 vty -mm-*oejftfn,bqjufmtufmmfoxjs*iofo esfj(fsÊufwps ejftphfoboouf,fztusplf *okfd ujpo "ohsjggffsnÚhmjdifo](https://reader033.vdocuments.pub/reader033/viewer/2022051911/6002391e85f33271374b0455/html5/thumbnails/6.jpg)
![Page 7: Hacking & Security – Das umfassende Handbuch · Î y -m Î Àtj y77 ª-j { a 6Î m 6 vty -mm-*oejftfn,bqjufmtufmmfoxjs*iofo esfj(fsÊufwps ejftphfoboouf,fztusplf *okfd ujpo "ohsjggffsnÚhmjdifo](https://reader033.vdocuments.pub/reader033/viewer/2022051911/6002391e85f33271374b0455/html5/thumbnails/7.jpg)
![Page 8: Hacking & Security – Das umfassende Handbuch · Î y -m Î Àtj y77 ª-j { a 6Î m 6 vty -mm-*oejftfn,bqjufmtufmmfoxjs*iofo esfj(fsÊufwps ejftphfoboouf,fztusplf *okfd ujpo "ohsjggffsnÚhmjdifo](https://reader033.vdocuments.pub/reader033/viewer/2022051911/6002391e85f33271374b0455/html5/thumbnails/8.jpg)
![Page 9: Hacking & Security – Das umfassende Handbuch · Î y -m Î Àtj y77 ª-j { a 6Î m 6 vty -mm-*oejftfn,bqjufmtufmmfoxjs*iofo esfj(fsÊufwps ejftphfoboouf,fztusplf *okfd ujpo "ohsjggffsnÚhmjdifo](https://reader033.vdocuments.pub/reader033/viewer/2022051911/6002391e85f33271374b0455/html5/thumbnails/9.jpg)
1
3
4
2
Hintertür herunterladen
Angreifer
Opfer192.168.0.115
Linux192.168.0.26
permanenteVerbindung
Hintertür übertragen
Webserver(php)
Digispark-Skript
![Page 10: Hacking & Security – Das umfassende Handbuch · Î y -m Î Àtj y77 ª-j { a 6Î m 6 vty -mm-*oejftfn,bqjufmtufmmfoxjs*iofo esfj(fsÊufwps ejftphfoboouf,fztusplf *okfd ujpo "ohsjggffsnÚhmjdifo](https://reader033.vdocuments.pub/reader033/viewer/2022051911/6002391e85f33271374b0455/html5/thumbnails/10.jpg)
![Page 11: Hacking & Security – Das umfassende Handbuch · Î y -m Î Àtj y77 ª-j { a 6Î m 6 vty -mm-*oejftfn,bqjufmtufmmfoxjs*iofo esfj(fsÊufwps ejftphfoboouf,fztusplf *okfd ujpo "ohsjggffsnÚhmjdifo](https://reader033.vdocuments.pub/reader033/viewer/2022051911/6002391e85f33271374b0455/html5/thumbnails/11.jpg)
![Page 12: Hacking & Security – Das umfassende Handbuch · Î y -m Î Àtj y77 ª-j { a 6Î m 6 vty -mm-*oejftfn,bqjufmtufmmfoxjs*iofo esfj(fsÊufwps ejftphfoboouf,fztusplf *okfd ujpo "ohsjggffsnÚhmjdifo](https://reader033.vdocuments.pub/reader033/viewer/2022051911/6002391e85f33271374b0455/html5/thumbnails/12.jpg)
Position 1: Nutzerdefinierte PayloadPosition 2: Nutzerdefinierte PayloadPosition 3: Arming Mode
![Page 13: Hacking & Security – Das umfassende Handbuch · Î y -m Î Àtj y77 ª-j { a 6Î m 6 vty -mm-*oejftfn,bqjufmtufmmfoxjs*iofo esfj(fsÊufwps ejftphfoboouf,fztusplf *okfd ujpo "ohsjggffsnÚhmjdifo](https://reader033.vdocuments.pub/reader033/viewer/2022051911/6002391e85f33271374b0455/html5/thumbnails/13.jpg)
![Page 14: Hacking & Security – Das umfassende Handbuch · Î y -m Î Àtj y77 ª-j { a 6Î m 6 vty -mm-*oejftfn,bqjufmtufmmfoxjs*iofo esfj(fsÊufwps ejftphfoboouf,fztusplf *okfd ujpo "ohsjggffsnÚhmjdifo](https://reader033.vdocuments.pub/reader033/viewer/2022051911/6002391e85f33271374b0455/html5/thumbnails/14.jpg)
![Page 15: Hacking & Security – Das umfassende Handbuch · Î y -m Î Àtj y77 ª-j { a 6Î m 6 vty -mm-*oejftfn,bqjufmtufmmfoxjs*iofo esfj(fsÊufwps ejftphfoboouf,fztusplf *okfd ujpo "ohsjggffsnÚhmjdifo](https://reader033.vdocuments.pub/reader033/viewer/2022051911/6002391e85f33271374b0455/html5/thumbnails/15.jpg)
![Page 16: Hacking & Security – Das umfassende Handbuch · Î y -m Î Àtj y77 ª-j { a 6Î m 6 vty -mm-*oejftfn,bqjufmtufmmfoxjs*iofo esfj(fsÊufwps ejftphfoboouf,fztusplf *okfd ujpo "ohsjggffsnÚhmjdifo](https://reader033.vdocuments.pub/reader033/viewer/2022051911/6002391e85f33271374b0455/html5/thumbnails/16.jpg)
![Page 17: Hacking & Security – Das umfassende Handbuch · Î y -m Î Àtj y77 ª-j { a 6Î m 6 vty -mm-*oejftfn,bqjufmtufmmfoxjs*iofo esfj(fsÊufwps ejftphfoboouf,fztusplf *okfd ujpo "ohsjggffsnÚhmjdifo](https://reader033.vdocuments.pub/reader033/viewer/2022051911/6002391e85f33271374b0455/html5/thumbnails/17.jpg)
![Page 18: Hacking & Security – Das umfassende Handbuch · Î y -m Î Àtj y77 ª-j { a 6Î m 6 vty -mm-*oejftfn,bqjufmtufmmfoxjs*iofo esfj(fsÊufwps ejftphfoboouf,fztusplf *okfd ujpo "ohsjggffsnÚhmjdifo](https://reader033.vdocuments.pub/reader033/viewer/2022051911/6002391e85f33271374b0455/html5/thumbnails/18.jpg)
2
1Reverse Verbindung
Angreifer
Opfer/payloads/switch1persistent.shlauncher.shpayload.txt
/payloads/switch2payload.txt
Empire-Framework192.168.0.11
macOS192.168.0.134
Permanente Verbindung
![Page 19: Hacking & Security – Das umfassende Handbuch · Î y -m Î Àtj y77 ª-j { a 6Î m 6 vty -mm-*oejftfn,bqjufmtufmmfoxjs*iofo esfj(fsÊufwps ejftphfoboouf,fztusplf *okfd ujpo "ohsjggffsnÚhmjdifo](https://reader033.vdocuments.pub/reader033/viewer/2022051911/6002391e85f33271374b0455/html5/thumbnails/19.jpg)
![Page 20: Hacking & Security – Das umfassende Handbuch · Î y -m Î Àtj y77 ª-j { a 6Î m 6 vty -mm-*oejftfn,bqjufmtufmmfoxjs*iofo esfj(fsÊufwps ejftphfoboouf,fztusplf *okfd ujpo "ohsjggffsnÚhmjdifo](https://reader033.vdocuments.pub/reader033/viewer/2022051911/6002391e85f33271374b0455/html5/thumbnails/20.jpg)
![Page 21: Hacking & Security – Das umfassende Handbuch · Î y -m Î Àtj y77 ª-j { a 6Î m 6 vty -mm-*oejftfn,bqjufmtufmmfoxjs*iofo esfj(fsÊufwps ejftphfoboouf,fztusplf *okfd ujpo "ohsjggffsnÚhmjdifo](https://reader033.vdocuments.pub/reader033/viewer/2022051911/6002391e85f33271374b0455/html5/thumbnails/21.jpg)
![Page 22: Hacking & Security – Das umfassende Handbuch · Î y -m Î Àtj y77 ª-j { a 6Î m 6 vty -mm-*oejftfn,bqjufmtufmmfoxjs*iofo esfj(fsÊufwps ejftphfoboouf,fztusplf *okfd ujpo "ohsjggffsnÚhmjdifo](https://reader033.vdocuments.pub/reader033/viewer/2022051911/6002391e85f33271374b0455/html5/thumbnails/22.jpg)
![Page 23: Hacking & Security – Das umfassende Handbuch · Î y -m Î Àtj y77 ª-j { a 6Î m 6 vty -mm-*oejftfn,bqjufmtufmmfoxjs*iofo esfj(fsÊufwps ejftphfoboouf,fztusplf *okfd ujpo "ohsjggffsnÚhmjdifo](https://reader033.vdocuments.pub/reader033/viewer/2022051911/6002391e85f33271374b0455/html5/thumbnails/23.jpg)
![Page 24: Hacking & Security – Das umfassende Handbuch · Î y -m Î Àtj y77 ª-j { a 6Î m 6 vty -mm-*oejftfn,bqjufmtufmmfoxjs*iofo esfj(fsÊufwps ejftphfoboouf,fztusplf *okfd ujpo "ohsjggffsnÚhmjdifo](https://reader033.vdocuments.pub/reader033/viewer/2022051911/6002391e85f33271374b0455/html5/thumbnails/24.jpg)
![Page 25: Hacking & Security – Das umfassende Handbuch · Î y -m Î Àtj y77 ª-j { a 6Î m 6 vty -mm-*oejftfn,bqjufmtufmmfoxjs*iofo esfj(fsÊufwps ejftphfoboouf,fztusplf *okfd ujpo "ohsjggffsnÚhmjdifo](https://reader033.vdocuments.pub/reader033/viewer/2022051911/6002391e85f33271374b0455/html5/thumbnails/25.jpg)
![Page 26: Hacking & Security – Das umfassende Handbuch · Î y -m Î Àtj y77 ª-j { a 6Î m 6 vty -mm-*oejftfn,bqjufmtufmmfoxjs*iofo esfj(fsÊufwps ejftphfoboouf,fztusplf *okfd ujpo "ohsjggffsnÚhmjdifo](https://reader033.vdocuments.pub/reader033/viewer/2022051911/6002391e85f33271374b0455/html5/thumbnails/26.jpg)
![Page 27: Hacking & Security – Das umfassende Handbuch · Î y -m Î Àtj y77 ª-j { a 6Î m 6 vty -mm-*oejftfn,bqjufmtufmmfoxjs*iofo esfj(fsÊufwps ejftphfoboouf,fztusplf *okfd ujpo "ohsjggffsnÚhmjdifo](https://reader033.vdocuments.pub/reader033/viewer/2022051911/6002391e85f33271374b0455/html5/thumbnails/27.jpg)
![Page 28: Hacking & Security – Das umfassende Handbuch · Î y -m Î Àtj y77 ª-j { a 6Î m 6 vty -mm-*oejftfn,bqjufmtufmmfoxjs*iofo esfj(fsÊufwps ejftphfoboouf,fztusplf *okfd ujpo "ohsjggffsnÚhmjdifo](https://reader033.vdocuments.pub/reader033/viewer/2022051911/6002391e85f33271374b0455/html5/thumbnails/28.jpg)
![Page 29: Hacking & Security – Das umfassende Handbuch · Î y -m Î Àtj y77 ª-j { a 6Î m 6 vty -mm-*oejftfn,bqjufmtufmmfoxjs*iofo esfj(fsÊufwps ejftphfoboouf,fztusplf *okfd ujpo "ohsjggffsnÚhmjdifo](https://reader033.vdocuments.pub/reader033/viewer/2022051911/6002391e85f33271374b0455/html5/thumbnails/29.jpg)
![Page 30: Hacking & Security – Das umfassende Handbuch · Î y -m Î Àtj y77 ª-j { a 6Î m 6 vty -mm-*oejftfn,bqjufmtufmmfoxjs*iofo esfj(fsÊufwps ejftphfoboouf,fztusplf *okfd ujpo "ohsjggffsnÚhmjdifo](https://reader033.vdocuments.pub/reader033/viewer/2022051911/6002391e85f33271374b0455/html5/thumbnails/30.jpg)
![Page 31: Hacking & Security – Das umfassende Handbuch · Î y -m Î Àtj y77 ª-j { a 6Î m 6 vty -mm-*oejftfn,bqjufmtufmmfoxjs*iofo esfj(fsÊufwps ejftphfoboouf,fztusplf *okfd ujpo "ohsjggffsnÚhmjdifo](https://reader033.vdocuments.pub/reader033/viewer/2022051911/6002391e85f33271374b0455/html5/thumbnails/31.jpg)
![Page 32: Hacking & Security – Das umfassende Handbuch · Î y -m Î Àtj y77 ª-j { a 6Î m 6 vty -mm-*oejftfn,bqjufmtufmmfoxjs*iofo esfj(fsÊufwps ejftphfoboouf,fztusplf *okfd ujpo "ohsjggffsnÚhmjdifo](https://reader033.vdocuments.pub/reader033/viewer/2022051911/6002391e85f33271374b0455/html5/thumbnails/32.jpg)
![Page 33: Hacking & Security – Das umfassende Handbuch · Î y -m Î Àtj y77 ª-j { a 6Î m 6 vty -mm-*oejftfn,bqjufmtufmmfoxjs*iofo esfj(fsÊufwps ejftphfoboouf,fztusplf *okfd ujpo "ohsjggffsnÚhmjdifo](https://reader033.vdocuments.pub/reader033/viewer/2022051911/6002391e85f33271374b0455/html5/thumbnails/33.jpg)
![Page 34: Hacking & Security – Das umfassende Handbuch · Î y -m Î Àtj y77 ª-j { a 6Î m 6 vty -mm-*oejftfn,bqjufmtufmmfoxjs*iofo esfj(fsÊufwps ejftphfoboouf,fztusplf *okfd ujpo "ohsjggffsnÚhmjdifo](https://reader033.vdocuments.pub/reader033/viewer/2022051911/6002391e85f33271374b0455/html5/thumbnails/34.jpg)
![Page 35: Hacking & Security – Das umfassende Handbuch · Î y -m Î Àtj y77 ª-j { a 6Î m 6 vty -mm-*oejftfn,bqjufmtufmmfoxjs*iofo esfj(fsÊufwps ejftphfoboouf,fztusplf *okfd ujpo "ohsjggffsnÚhmjdifo](https://reader033.vdocuments.pub/reader033/viewer/2022051911/6002391e85f33271374b0455/html5/thumbnails/35.jpg)
![Page 36: Hacking & Security – Das umfassende Handbuch · Î y -m Î Àtj y77 ª-j { a 6Î m 6 vty -mm-*oejftfn,bqjufmtufmmfoxjs*iofo esfj(fsÊufwps ejftphfoboouf,fztusplf *okfd ujpo "ohsjggffsnÚhmjdifo](https://reader033.vdocuments.pub/reader033/viewer/2022051911/6002391e85f33271374b0455/html5/thumbnails/36.jpg)
![Page 37: Hacking & Security – Das umfassende Handbuch · Î y -m Î Àtj y77 ª-j { a 6Î m 6 vty -mm-*oejftfn,bqjufmtufmmfoxjs*iofo esfj(fsÊufwps ejftphfoboouf,fztusplf *okfd ujpo "ohsjggffsnÚhmjdifo](https://reader033.vdocuments.pub/reader033/viewer/2022051911/6002391e85f33271374b0455/html5/thumbnails/37.jpg)
![Page 38: Hacking & Security – Das umfassende Handbuch · Î y -m Î Àtj y77 ª-j { a 6Î m 6 vty -mm-*oejftfn,bqjufmtufmmfoxjs*iofo esfj(fsÊufwps ejftphfoboouf,fztusplf *okfd ujpo "ohsjggffsnÚhmjdifo](https://reader033.vdocuments.pub/reader033/viewer/2022051911/6002391e85f33271374b0455/html5/thumbnails/38.jpg)
![Page 39: Hacking & Security – Das umfassende Handbuch · Î y -m Î Àtj y77 ª-j { a 6Î m 6 vty -mm-*oejftfn,bqjufmtufmmfoxjs*iofo esfj(fsÊufwps ejftphfoboouf,fztusplf *okfd ujpo "ohsjggffsnÚhmjdifo](https://reader033.vdocuments.pub/reader033/viewer/2022051911/6002391e85f33271374b0455/html5/thumbnails/39.jpg)