-->

Recent Posts



Using Meterpreter

Hi friends,
It's been long time I've posted about Meterpreter. Now lets start attacking!!!!!

Now I'll show you how to gain access to a PC using this tool. Here I'm going to use Armitage for this tutorial. If you're not sure about about the tool, visit Meterpreter Installation Guide for details.

What all do you need for this HACK?
1. Metasploit Framework
2. Oracle JAVA 1.7
3. Internet Connection.
4. The most important thing PATIENCE!!!

If you are ready with all the above then it's the time to start.

For my convenience I'm using BackTrack. If you guys want the same just download from our site.



Step 1 : Open armitage on Backtrack 5:
By Going To : Backtrack > Exploitation Tools > Network Exploitation Tools > Metasploit Framework > armitage.

Step 2 : Connect Armitage:
Click on the connect Button .

Step 3 : Connecting Armitage :
Now use the patience part,and stretch your legs,it takes some time to connect.

Step 4 :  Armitage Window :
It has 3 Panels -
Target Panel
Module Panel
Tabs Panel

Step 5 : Finding the alive host on the Network :
Now you will search for Host on you network,By Going to Hosts -> Nmap Scan -> Quick Scan (OS detect).This will perform a quick scan to detect the host and their operating systems and vulnerabilities.

Step 6 : Inputting The Scan Range :
Now You have to insert scan range,that is you LAN ip range,Most preferably it would start with 192.168.0.- or 10.0.0.-.NOTE : the ( - ) resembles the computers on LAN.
Start the Scan.

Step 7 : Scan Complete:
After the scan has completed,if their are any other PC's on your network on,then they would be visible in the Target Pane (the Big Black box on the upper right).

Step 8 : Finding Attacks :
Now the Fun Parts starts,Click on Attacks tab in your toolbar and select Find Attacks (Not hail mary,you might not be ready for that).Start the scan and wait till it completes.


Step 9 : Set the vulnerability :
Right Click on the Host icon (windows pc) -> Select attacks -> smb -> ms08_067_netapi  vulnerability .
Now a window should pop,Click on the check-box that says "Use  a reverse connection" .
Start Attack

Step 10 : The Final Result :
So did the Host Icon Turn Red ? That Means YOU PASSED!!!!!!

Once you are connected with the system, visit this page for some attacks