WIN10 MetaExplot
WIN10 MetaExplot
Documented by : www.linkedin.com/in/saira-cyber83
Windows 10 Exploitation with Metasploit
Tool We Need :
Window 10
Kali Linux
Netdiscover
Nmap
Steps :
Start your window10 machine and run below command to find the ip address of
your win10 machine.
Ipconfig .
Now machine is running let do our next step .
We will scan our network for target machine on our kali Linux terminal
For this we will use netdiscover
Netdiscover : is a network scanning tool used to discover devices connected to
a network.
Next step is to open your kali machine and run the below command to find the ip
address of your kali linux machine .
Ifconfig
Now ping the target machine used to check if a host is reachable on a network and
to measure the round-trip time for data sent between the local machine and the
target host.
Ping <host ip>
The next thing that I did was to scan the target machine from my attack machine.
Scanning is the process of discovering the open ports on the target machine and the
services running on those ports. This helps to narrow down the attack pattern
against that machine. I used nmap for scanning:
nmap -A 192.168.184.146
Now we done the reconnaissance step our next step is create a malicious payload
now run the below command :
After the creation of payload we have to load this file on to the victim’s machines ,
here the best part is to do social engineering , or you can make your payload fully
undetectable to execute the malicious payload on target machine , as for now I am
performing attack within my network so I transfer this file on target machine and
execute it .
Msfconsole
Now, type the below commands to select a listener and check the required fields
Use multi/handler
Show options
Set lhost <you ip >
Run
run the command and then go to the target machine and execute the malicious
payload when you press enter the session will be open .
YES ! here our session is created with the target machine we execute
the payload successfully .
Now we are in window 10 machine .
Now Run the help command which will display information about available
commands and how to use them within a specific context.
For now we are going to run the screenshot command which will take the
screenshot of window10
Also screenshare command : which will share the current screen running on
window10 machine .
In this way you can run all the commands one by one and take full control of
victims machine .
Conclusion:
Thank you .