{"id":6482,"date":"2013-08-08T19:04:58","date_gmt":"2013-08-08T22:04:58","guid":{"rendered":"http:\/\/www.ethicalhacker.com.br\/site\/?p=6482"},"modified":"2019-07-16T12:52:29","modified_gmt":"2019-07-16T15:52:29","slug":"websploit","status":"publish","type":"post","link":"https:\/\/www.ethicalhacker.com.br\/site\/2013\/08\/exploits\/websploit\/","title":{"rendered":"Websploit"},"content":{"rendered":"<p style=\"text-align: justify;\">Ola Pessoal !!! Bem vindo ao site BackTrack Brasil !!!<\/p>\n<p style=\"text-align: justify;\">Websploit \u00e9 uma ferramenta para explora\u00e7\u00e3o de vulnerabilidade web utilizando linhas de comandos juntamente com uma estrtura de m\u00f3dulos para executarmos diferentes trabalhos. Websploit faz parte da nova distribui\u00e7\u00e3o Kali Linux.<\/p>\n<p style=\"text-align: justify;\">Websploit possui quatro categorias de m\u00f3dulos, sendo:<\/p>\n<p style=\"text-align: justify;\">M\u00f3dulos de Web.<br \/>\nM\u00f3dulos de Rede<br \/>\nM\u00f3dulos\u00a0de Explora\u00e7\u00e3o<br \/>\nM\u00f3dulos\u00a0de Wireless<\/p>\n<p style=\"text-align: justify;\">Utilizando m\u00f3dulo de wireless poderemos executar vetores de ataque WIFI bastante interessante, como WiFi Jammer e WiFi Dos Attack. um grande n\u00famero de vetores para ataques interessantes est\u00e3o dispon\u00edveis nos\u00a0m\u00f3dulos\u00a0de rede, como:<\/p>\n<p style=\"text-align: justify;\">ARP cache DOS attack<br \/>\nMiddle Finger Of Doom Attack<br \/>\nMan In The Middle Attack<br \/>\nMan Left In The Middle Attack<br \/>\nFake Update Attack Using DNS Spoof<\/p>\n<p style=\"text-align: justify;\">Websploit depende do Metasplot para executar alguns modulos, portanto \u00e9 recomendado que o Metasploit esteja configurado. Estaremos demonstrando alguns exemplos pr\u00e1ticos em um sistema confinado utilizando m\u00e1quinas virtuais.<\/p>\n<p style=\"text-align: justify;\">Acesso ao websploit<\/p>\n<p><a href=\"http:\/\/www.ethicalhacker.com.br\/site\/wp-content\/uploads\/02.png\" class=\"gallery_colorbox\"><img loading=\"lazy\" decoding=\"async\" class=\"size-medium wp-image-6488 aligncenter\" title=\"0\" src=\"http:\/\/www.ethicalhacker.com.br\/site\/wp-content\/uploads\/02-300x222.png\"  alt=\"\" width=\"300\" height=\"222\" srcset=\"https:\/\/www.ethicalhacker.com.br\/site\/wp-content\/uploads\/02-300x222.png 300w, https:\/\/www.ethicalhacker.com.br\/site\/wp-content\/uploads\/02-1024x758.png 1024w, https:\/\/www.ethicalhacker.com.br\/site\/wp-content\/uploads\/02.png 1280w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><\/p>\n<p style=\"text-align: center;\">Fig 1<\/p>\n<p style=\"text-align: left;\">Vers\u00e3o do Websploit utilizando o Kali Linux<\/p>\n<p style=\"text-align: left;\"><a href=\"http:\/\/www.ethicalhacker.com.br\/site\/wp-content\/uploads\/127.png\" class=\"gallery_colorbox\"><img loading=\"lazy\" decoding=\"async\" class=\"size-medium wp-image-6489 aligncenter\" title=\"1\" src=\"http:\/\/www.ethicalhacker.com.br\/site\/wp-content\/uploads\/127-300x222.png\"  alt=\"\" width=\"300\" height=\"222\" srcset=\"https:\/\/www.ethicalhacker.com.br\/site\/wp-content\/uploads\/127-300x222.png 300w, https:\/\/www.ethicalhacker.com.br\/site\/wp-content\/uploads\/127-1024x758.png 1024w, https:\/\/www.ethicalhacker.com.br\/site\/wp-content\/uploads\/127.png 1280w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><\/p>\n<p style=\"text-align: center;\">Fig 2<\/p>\n<p style=\"text-align: left;\">Verificando os comandos atrav\u00e9s do help<\/p>\n<p style=\"text-align: left;\"><a href=\"http:\/\/www.ethicalhacker.com.br\/site\/wp-content\/uploads\/221.png\" class=\"gallery_colorbox\"><img loading=\"lazy\" decoding=\"async\" class=\"size-medium wp-image-6490 aligncenter\" title=\"2\" src=\"http:\/\/www.ethicalhacker.com.br\/site\/wp-content\/uploads\/221-300x222.png\"  alt=\"\" width=\"300\" height=\"222\" srcset=\"https:\/\/www.ethicalhacker.com.br\/site\/wp-content\/uploads\/221-300x222.png 300w, https:\/\/www.ethicalhacker.com.br\/site\/wp-content\/uploads\/221-1024x758.png 1024w, https:\/\/www.ethicalhacker.com.br\/site\/wp-content\/uploads\/221.png 1280w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><\/p>\n<p style=\"text-align: center;\">Fig 3<\/p>\n<p style=\"text-align: left;\">Verificando os modulos do Websploit<\/p>\n<p style=\"text-align: left;\"><a href=\"http:\/\/www.ethicalhacker.com.br\/site\/wp-content\/uploads\/316.png\" class=\"gallery_colorbox\"><img loading=\"lazy\" decoding=\"async\" class=\"size-medium wp-image-6491 aligncenter\" title=\"3\" src=\"http:\/\/www.ethicalhacker.com.br\/site\/wp-content\/uploads\/316-300x221.png\"  alt=\"\" width=\"300\" height=\"221\" srcset=\"https:\/\/www.ethicalhacker.com.br\/site\/wp-content\/uploads\/316-300x221.png 300w, https:\/\/www.ethicalhacker.com.br\/site\/wp-content\/uploads\/316-1024x757.png 1024w, https:\/\/www.ethicalhacker.com.br\/site\/wp-content\/uploads\/316.png 1276w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><\/p>\n<p style=\"text-align: center;\">Fig 4<\/p>\n<p style=\"text-align: left;\">Varredura em um m\u00e1quina virtual IP 192.168.122.20<\/p>\n<p style=\"text-align: left;\"><a href=\"http:\/\/www.ethicalhacker.com.br\/site\/wp-content\/uploads\/415.png\" class=\"gallery_colorbox\"><img loading=\"lazy\" decoding=\"async\" class=\"size-medium wp-image-6492 aligncenter\" title=\"4\" src=\"http:\/\/www.ethicalhacker.com.br\/site\/wp-content\/uploads\/415-300x221.png\"  alt=\"\" width=\"300\" height=\"221\" srcset=\"https:\/\/www.ethicalhacker.com.br\/site\/wp-content\/uploads\/415-300x221.png 300w, https:\/\/www.ethicalhacker.com.br\/site\/wp-content\/uploads\/415-1024x757.png 1024w, https:\/\/www.ethicalhacker.com.br\/site\/wp-content\/uploads\/415.png 1276w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><\/p>\n<p style=\"text-align: center;\">Fig 5<\/p>\n<p style=\"text-align: left;\">Complemento da varredura na m\u00e1quina virtual IP 192.168.122.20<\/p>\n<p style=\"text-align: left;\"><a href=\"http:\/\/www.ethicalhacker.com.br\/site\/wp-content\/uploads\/513.png\" class=\"gallery_colorbox\"><img loading=\"lazy\" decoding=\"async\" class=\"size-medium wp-image-6493 aligncenter\" title=\"5\" src=\"http:\/\/www.ethicalhacker.com.br\/site\/wp-content\/uploads\/513-300x221.png\"  alt=\"\" width=\"300\" height=\"221\" srcset=\"https:\/\/www.ethicalhacker.com.br\/site\/wp-content\/uploads\/513-300x221.png 300w, https:\/\/www.ethicalhacker.com.br\/site\/wp-content\/uploads\/513-1024x757.png 1024w, https:\/\/www.ethicalhacker.com.br\/site\/wp-content\/uploads\/513.png 1276w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><\/p>\n<p style=\"text-align: center;\">Fig 6<\/p>\n<p style=\"text-align: left;\">Varredura utilizando o m\u00f3dulo WEB\/PMA<\/p>\n<p style=\"text-align: left;\"><a href=\"http:\/\/www.ethicalhacker.com.br\/site\/wp-content\/uploads\/612.png\" class=\"gallery_colorbox\"><img loading=\"lazy\" decoding=\"async\" class=\"size-medium wp-image-6495 aligncenter\" title=\"6\" src=\"http:\/\/www.ethicalhacker.com.br\/site\/wp-content\/uploads\/612-300x222.png\"  alt=\"\" width=\"300\" height=\"222\" srcset=\"https:\/\/www.ethicalhacker.com.br\/site\/wp-content\/uploads\/612-300x222.png 300w, https:\/\/www.ethicalhacker.com.br\/site\/wp-content\/uploads\/612-1024x758.png 1024w, https:\/\/www.ethicalhacker.com.br\/site\/wp-content\/uploads\/612.png 1280w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><\/p>\n<p style=\"text-align: center;\">Fig 7<\/p>\n<p style=\"text-align: justify;\">Bastante interessante o Websploit, sendo muito importante testarmos os seus m\u00f3dulos em um ambiente confinado, possibilitando intendermos o potencial desta ferramenta propiciando pentest profissional para nossas aplica\u00e7\u00f5es web que posteriormente entrar\u00e3o em produ\u00e7\u00e3o.<\/p>\n<p>Um grande abra\u00e7o a todos e at\u00e9 a pr\u00f3xima !!!<\/p>\n<p>&nbsp;<\/p>\n\r\n\t\t<div class='author-shortcodes'>\r\n\t\t\t<div class='author-inner'>\r\n\t\t\t\t<div class='author-image'>\r\n\t\t\t<img src='https:\/\/www.ethicalhacker.com.br\/site\/wp-content\/uploads\/2012-05-30-12.45.38-1143174_57x57.jpg' alt='' \/>\r\n\t\t\t<div class='author-overlay'><\/div>\r\n\t\t<\/div> <!-- .author-image --> \r\n\t\t<div class='author-info'>\r\n\t\t\t<p>By:\u00a0<a title=\"Grsecurity\" href=\"http:\/\/www.grsecurity.com.br\" target=\"_blank\" rel=\"noopener noreferrer\"><strong>Gerson Raymond<\/strong><\/a><\/p>\n<p>T\u00e9cnico em Contabilidade, T\u00e9cnico em Eletr\u00f4nica, T\u00e9cnico em Telecomunica\u00e7\u00f5es, Bacharel em Ci\u00eancia da Computa\u00e7\u00e3o, Administrador de Redes Linux (CentOS, XEN, Zabbix, Asterisk\/Elastix) e P\u00f3s-Graduado em\u00a0<strong><a title=\"Mackenzie\" href=\"http:\/\/www.mackenzie.com.br\/seg_tec_informacao.html\" target=\"_blank\" rel=\"noopener noreferrer\">Seguran\u00e7a em Tecnologia da Informa\u00e7\u00e3o \u2013 UNIVERSIDADE MACKENZIE \u2013 SP<\/a>.<\/strong><\/p>\n<p>Homepage:\u00a0<strong><a title=\"Grsecurity\" href=\"http:\/\/www.grsecurity.com.br\/\" target=\"_blank\" rel=\"noopener noreferrer\">http:\/\/www.grsecurity.com.br<\/a><\/strong><\/p>\n<p><em>\u00a0<\/em>\r\n\t\t<\/div> <!-- .author-info --><\/p>\r\n\t\t\t<\/div> <!-- .author-inner -->\r\n\t\t<\/div> <!-- .author-shortcodes -->\n","protected":false},"excerpt":{"rendered":"<p>Ola Pessoal !!! Bem vindo ao site BackTrack Brasil !!! Websploit \u00e9 uma ferramenta para explora\u00e7\u00e3o de vulnerabilidade web utilizando linhas de comandos juntamente com uma estrtura de m\u00f3dulos para executarmos diferentes trabalhos. Websploit faz parte da nova distribui\u00e7\u00e3o Kali Linux. Websploit possui quatro categorias de m\u00f3dulos, sendo: M\u00f3dulos de Web. M\u00f3dulos de Rede M\u00f3dulos\u00a0de [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":6485,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[100,21,101],"tags":[],"class_list":["post-6482","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-diversos","category-exploits","category-tutorial-backtrack"],"_links":{"self":[{"href":"https:\/\/www.ethicalhacker.com.br\/site\/wp-json\/wp\/v2\/posts\/6482","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.ethicalhacker.com.br\/site\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.ethicalhacker.com.br\/site\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.ethicalhacker.com.br\/site\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.ethicalhacker.com.br\/site\/wp-json\/wp\/v2\/comments?post=6482"}],"version-history":[{"count":15,"href":"https:\/\/www.ethicalhacker.com.br\/site\/wp-json\/wp\/v2\/posts\/6482\/revisions"}],"predecessor-version":[{"id":10466,"href":"https:\/\/www.ethicalhacker.com.br\/site\/wp-json\/wp\/v2\/posts\/6482\/revisions\/10466"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.ethicalhacker.com.br\/site\/wp-json\/wp\/v2\/media\/6485"}],"wp:attachment":[{"href":"https:\/\/www.ethicalhacker.com.br\/site\/wp-json\/wp\/v2\/media?parent=6482"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.ethicalhacker.com.br\/site\/wp-json\/wp\/v2\/categories?post=6482"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.ethicalhacker.com.br\/site\/wp-json\/wp\/v2\/tags?post=6482"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}