I am on an open wifi network. The gateway I am connected to , 192.168.1.1, has a secure network behind it at gateway 192.168.11.1. A series of Nmap commands painted me a picture of the network, to include CCTV server, POS system, and a computer. Some more digging and I was able to open up the network printer in browser. It has no admin password. I can see the WPA passphrase on the website, but it is dotted out. Using the network printer, how do I access other computers on the network, see the WPA passphrase, or do anything really. Metasploit has been unable to open any session. Is this because the network I am trying to exploit is two hops away? Any help is appreciated. Thanks.
Forum Thread: Unsecure Network, Access to Printer, Now What?
- Hot
- Active
-
Forum Thread: How to Track Who Is Sms Bombing Me . 4 Replies
1 mo ago -
Forum Thread: Removing Pay-as-You-Go Meter on Loan Phones. 1 Replies
2 mo ago -
Forum Thread: Hydra Syntax Issue Stops After 16 Attempts 3 Replies
2 mo ago -
Forum Thread: moab5.Sh Error While Running Metasploit 17 Replies
3 mo ago -
Forum Thread: Execute Reverse PHP Shell with Metasploit 1 Replies
4 mo ago -
Forum Thread: Install Metasploit Framework in Termux No Root Needed M-Wiz Tool 1 Replies
5 mo ago -
Forum Thread: Hack and Track People's Device Constantly Using TRAPE 35 Replies
5 mo ago -
Forum Thread: When My Kali Linux Finishes Installing (It Is Ready to Boot), and When I Try to Boot It All I Get Is a Black Screen. 8 Replies
6 mo ago -
Forum Thread: HACK ANDROID with KALI USING PORT FORWARDING(portmap.io) 12 Replies
6 mo ago -
Forum Thread: Hack Instagram Account Using BruteForce 208 Replies
7 mo ago -
Forum Thread: Metasploit reverse_tcp Handler Problem 47 Replies
9 mo ago -
Forum Thread: How to Train to Be an IT Security Professional (Ethical Hacker) 22 Replies
9 mo ago -
Metasploit Error: Handler Failed to Bind 41 Replies
9 mo ago -
Forum Thread: How to Hack Android Phone Using Same Wifi 21 Replies
9 mo ago -
How to: HACK Android Device with TermuX on Android | Part #1 - Over the Internet [Ultimate Guide] 177 Replies
9 mo ago -
How to: Crack Instagram Passwords Using Instainsane 36 Replies
9 mo ago -
Forum Thread: How to Hack an Android Device Remotely, to Gain Acces to Gmail, Facebook, Twitter and More 5 Replies
10 mo ago -
Forum Thread: How Many Hackers Have Played Watch_Dogs Game Before? 13 Replies
10 mo ago -
Forum Thread: How to Hack an Android Device with Only a Ip Adress 55 Replies
11 mo ago -
How to: Sign the APK File with Embedded Payload (The Ultimate Guide) 10 Replies
11 mo ago
-
How To: Scan for Vulnerabilities on Any Website Using Nikto
-
How to Hack Wi-Fi: Cracking WPA2-PSK Passwords with Cowpatty
-
Locking Down Linux: Using Ubuntu as Your Primary OS, Part 2 (Network Attack Defense)
-
How to Hack Wi-Fi: Cracking WPA2-PSK Passwords Using Aircrack-Ng
-
Steganography: How to Hide Secret Data Inside an Image or Audio File in Seconds
-
How To: Stealthfully Sniff Wi-Fi Activity Without Connecting to a Target Router
-
Android for Hackers: How to Turn an Android Phone into a Hacking Device Without Root
-
How To: Exploit EternalBlue on Windows Server with Metasploit
-
How To: Gain SSH Access to Servers by Brute-Forcing Credentials
-
How To: Use Mitaka to Perform In-Browser OSINT to Identify Malware, Sketchy Sites, Shady Emails & More
-
How To: Create Rainbow Tables for Hashing Algorithms Like MD5, SHA1 & NTLM
-
Locking Down Linux: Using Ubuntu as Your Primary OS, Part 3 (Application Hardening & Sandboxing)
-
How To: Hunt Down Social Media Accounts by Usernames with Sherlock
-
How To: Pick an Antenna for Wi-Fi Hacking
-
The Hacks of Mr. Robot: How to Spy on Anyone's Smartphone Activity
-
Advice from a Real Hacker: How I Would Build the God's Eye of Furious 7
-
Locking Down Linux: Using Ubuntu as Your Primary OS, Part 1 (Physical Attack Defense)
-
How To: Hide a Virus Inside of a Fake Picture
-
How to Use PowerShell Empire: Generating Stagers for Post Exploitation of Windows Hosts
-
How To: Find Hacked Accounts Online ~ PART 2 - Pastebin
6 Responses
I've looked at IoT devices before. You need to determine if there are open ports on the device. Start with nmap or netcat. The next thing I would do, is try to get a firmware update from the manufacturer. Here you can extract the password hash for telnet, ssh, etc, out of the etc/passwd or etc/shadow.
Then if you try to connect via SSH/telnet, using the password (if there even is one), and bobs your uncle.
It is probably running BusyBox, so it isn't like you can just apt-get stuff to put on it, but you can compile binaries on your PC and transfer the money to it over with wget or something else.
I'd be shocked if you weren't able to get a root shell.
Appreciate you reaching out to me. I really can't get an exploit going. I believe because I am accessing the host through their wifi proxy router. How do i configure metasploit to support and make a payload work.
Try port forwarding the backdoor
Here is what i would do. I would use an evil twin attack to find my way into the network which is way easier that brute forcing a WPA handshake. Once inside my main course of action would be a Man In The Middle attack. From here it will be a matter of hooking their browsers on the fly and getting a more or less temporary session on Metasploit that will give me enough time to upload a custom backdoor.
Or i could just hijack their downloads and and get my malware in, in the form of trojans.
But if you do manage to find another juicy vulnerability from your nmap scans, go for it first before attempting the above.
;) actions have consequences
I'm not new to such devices but have you tried opening ports of the device maybe you could find something!!
I've tried and tried. Lots of open ports, I even managed to find a vulnerability in the internal network router and downloaded the config file, but still no luck. Config file did not include any credentials to get on the private network. Metasploit cannot get a session open. The victim hosts are behind a second gateway.
Share Your Thoughts