metasploit old
A good hacker should have anavathmismeno the metasploit for this Alliotlet’s turn to fats java script leaves a small margin to those who do nothave upgrades 🙂
let’s move on to roast the metasploit fixes payloads listener and exc. attack with backtrack the set
Step 1. We start the BackTrack, we login to the root account and activatethe connection of the operating network. Pictured are underlined commandsthat we used. Obviously, in your case might set a different name for thenetwork interface.
Step 2. Although we can work on the text console, the graphical interface ispreferable. The start, then typing startx. Once loaded open up a console(click on the relevant icon to the left of the horizontal bar, bottom) andmaximize.
Step 5. Now choose a method of coding the payload that will make theSET. Our goal is to avoid the location from which anti-virus running on the victim machine. For best results choose the method 15 (Multi-Encoder).
Step 6. Before you start coding the SET will be asked to what port needs to listen for connections from a VNC server to be «planted» in the victim’s PC(Enter the port of the listener). Leave the default port, by simply pressing the[Enter]. Immediately after the encoding begins. Once the SET i ‘save thepayload to the list / pentest / exploits / SET, giving it the name msf.exe.
Step 7. He will propose to start the listener. We write «yes» (without the quotes), press [Enter] and after a few seconds the listener will rise from within Metasploit.
Step 8. We now need to send to prospective victim msf.exe – and of courseto convince them to perform. In a real scenario, at this point the attackerputs his imagination to work: After you decide how to send the victim thepayload (eg, via mail, instant messenger, etc.), strive to convince the recipient to execute. Note that the better knowledge of the target (eg, interests, hobbies, fears, etc.), the greater is the chance to make him run thepayload;)
Step 9. The victim tsimpaei the bait! The attacker is sure about this, not least because in the BackTrack to open a program window TightVNC, in which shows the desktop of the remote Windows box! Needless to note that the attacker has full control of the machine – up to close it can!
In a real attack on the victim machine would not open the Command Prompt window that appears in the picture above. In fact, the victim would not ‘seeanything on screen that testified that someone, somewhere, has access and / or control the computer. Also, the payload of the attacker would take care to be automatically activated, and of course, implicitly after each (re) startoperating. We think the moral of this educational show is obvious. In short, be suspicious, not complacent just because you run a security software and whenever in doubt about any action you are going to do, do not do:Probably your instincts are right!
by deltahacker (revision)