![set social engineering toolkit](https://2.bp.blogspot.com/-snTBsMTLxlY/XEjRr_AlkwI/AAAAAAAAHl0/BGjoVOBFm8AeapMvtX6f3sbVeO7qsLjQgCLcBGAs/s1600/1.png)
2. Type y and press Enter to agree to terms and service.
![](https://3.bp.blogspot.com/-Klw33x0YO84/XEjRsdyNAeI/AAAAAAAAHmA/cs_YDyflA0Q-aseNcuM8Jb6r37SufNdVQCLcBGAs/s1600/2.png)
3. Type 1 and press Enter
![social engineering attacks social engineering attacks](https://2.bp.blogspot.com/-80PMtkH-SSI/XEjRsh92qRI/AAAAAAAAHmE/K-_bFa3G7GAMJ_aiu8pDkMOO6wrhHG2uwCLcBGAs/s640/3.png)
4. Select option 4 and press Enter
![create a payload and listener create a payload and listener](https://3.bp.blogspot.com/-rPQ1EwgfjSU/XEjRtKE7IeI/AAAAAAAAHmI/aKdIG16YnmsOH5mMJb8HyW3366DDviFUQCLcBGAs/s1600/4.png)
5. Select option 2 for Windows Reverse TCP Meterpreter
![windows reverse tcp meterpreter windows reverse tcp meterpreter](https://1.bp.blogspot.com/-9WBjpEFOrtg/XEjRtptBoLI/AAAAAAAAHmM/SJ6BAnfXmX0ED4nCq0qeRdXCS1h6iEucgCLcBGAs/s1600/5.png)
6. Open a different terminal and type in ifconfig and press Enter and look for your IP address.
![ifconfig ifconfig](https://1.bp.blogspot.com/-WJ8vfOyq2AQ/XEjRuIaX3jI/AAAAAAAAHmQ/LNU3SocHSkUI8EtkRxCjMX1ycIHNrQzbgCLcBGAs/s640/6.png)
![lhost lhost ip address](https://2.bp.blogspot.com/-zOiXxEpITz8/XEjRugiArfI/AAAAAAAAHmU/EK5oaxKwhWMnxG9BR1r0jx5WlMECqE83ACLcBGAs/s640/7.png)
8. Type in any port number.
![port number port number](https://3.bp.blogspot.com/-cB_CpV6tPSw/XEjRvDGzVII/AAAAAAAAHmY/z9Z4bSAPQcEZjeGLRytfdnBtu5pbSeAKwCLcBGAs/s640/8.png)
9. Start the listener by typing in yes and press Enter
![listener listener](https://4.bp.blogspot.com/-ca56iud4fCk/XEjRvu34rOI/AAAAAAAAHmc/BX0jZ-HyrQUhGchPldYVqYNKEdPc5bTWgCLcBGAs/s640/9.png)
10. The payload is now generated and is located in the directory /root/.set. Navigate to it and copy it to your desktop like I did below using the cp command.
![cd /root/.set cd /root/.set](https://3.bp.blogspot.com/-3UYmV3bL80k/XEjRrzLfqwI/AAAAAAAAHl4/rpXH-t42sp8dXqwucOgVEw-WAlO4oiu6gCLcBGAs/s640/10.png)
![copy payload copy payload to desktop](https://1.bp.blogspot.com/-hBCRK7W3E-4/XEjRr8COZ3I/AAAAAAAAHl8/RLxJOt9NMkghCfbZF95uPMol3jfJ-woKwCLcBGAs/s640/11.png)
11. Now send this payload to any Windows machine and execute it. Once it is executed you should see a session on your Kali machine like I have below. Now you should be able to control the victim machine. Type in help and press Enter to see a list of command you can use.
![start the reverse tcp handler start the reverse tcp handler](https://4.bp.blogspot.com/-MSLNR-Srszs/XEjYNjO-2kI/AAAAAAAAHnE/zq_7q4IfaH8MgTjZMq1k2MRbK8-ZKdZmgCLcBGAs/s640/12.png)
Note that exploits are detectable by Windows default Anti-virus so you will have to use social engineering to convince the victim to disable his Anti-virus for this to work. Kali has an encoder that can help to evade Anti-virus like I used below but this method will not evade every Anti-virus so you will have to do your own research to find out what brand of Anti-virus the victim is using in order to know if this is the right method of attack to launch against him or her.
![encoding to evade antivirus encoding to evade antivirus](https://1.bp.blogspot.com/-_6ePm6pgfNI/XEjZMJlX01I/AAAAAAAAHnM/g4aw9RIYRqYwUk7mewQkbqAvRyrwr6yKQCLcBGAs/s640/encoding.png)
To display a list of encoder execute this command
msfvenom --list encoders
0 comments:
Post a Comment