background image


Chapter 12

The POP3 server configured by Metasploit intercepts the target’s email 

username and password at  , because all DNS requests are intercepted by 
the DNS server that Karmetasploit set up for us.

Getting a Shell

At this point, the user has no new messages, so he decides to do some web 
browsing. When the browser opens, a 

captive portal

 is presented to the user, 

as shown in Figure 12-1.

Figure 12-1: Karmetasploit captive portal

As the user sits in front of his computer wondering what’s going on, 

Karmetasploit is busy configuring the attack to capture cookies; set up fake 
email, DNS, and other servers; and launch exploits against the client’s browser—
all the result of the magic contained in our 



Of course, some degree of luck is involved in this attack. The browser 

will display a “Loading” page while exploits are launched. If the user is impa-
tient, he may simply close the browser window, which will stop our exploits.

Next, you can see the massive amount of output that results from this attack:

[*] HTTP REQUEST > GET /isapi/redir.dll Windows IE 6.0 

cookies=WT_NVR=0=/:1=downloads:2=downloads/en; WT_FPC=id=111.222.333.444-1008969152
d23f&LV=20103&V=3; A=I&I=AxUFAAAAAAAuBwAADSAT6RJMarfs902pHsnj0g!!; MUID=C7149D932C864

[*] Request '/ads' from

 [*] HTTP REQUEST > GET /forms.html Windows IE 6.0 cookies=

[*] HTTP REQUEST > GET /forms.html Windows IE 6.0 cookies=