The first computer I had to exploit the first victim, do information gathering and do exploitable
with file exploit
with file exploit
after that find the module to exploit
after get the module, used at metasploit and setting the set
set again at payload used meterpreter
and exploit
after connect to computer victim, make false application and send to computer victim that can be accessed. make with msfpayload and msfencode
after make the false application, upload the false application to computer victim
and look the result, false application already entered the victim computer
okay, This means I managed to create a backdoor on the victim computer
now, exit the meterpreter, and used multi handler module
and set payload again
now, exit the meterpreter, and used multi handler module
and set payload again
Tidak ada komentar:
Posting Komentar