Source |
CodingSec |
Identifiant |
874 |
Date de publication |
2016-04-27 22:30:56 (vue: 2016-04-27 22:30:56) |
Titre |
CREATING BACKDOORS AND EXPLOITS WITH METASPLOIT |
Texte |
Metasploit has the ability to create an executable payload. This can be extremely useful if you can get a target machine to run the executable. Attackers often use social engineering, phishing, and other attacks to get a victim to run a payload. If attackers can get their a victim to run a payload, there is no reason for an attacker to find and exploit vulnerable software. Basic Lab Topology Kali Linux 1.10 – (on outside or untrusted simulated environment) IP address: 192.168.2.100/24 GW: 192.168.2.2 (FW/IPS) Windows 8.1, patched running AV (on inside or trusted simulated environment) IP address: 192.168.1.32/24 GW: |
Envoyé |
Oui |
Condensat |
100/24 168 192 32/24 ability address: appeared attacker attackers attacks backdoors basic can coding create creating engineering environment executable exploit exploits extremely find first fw/ips get gw: has inside kali lab linux machine metasploit often other outside patched payload phishing post reason run running security simulated social software target topology trusted untrusted use useful victim vulnerable windows |
Tags |
|
Stories |
|
Notes |
|
Move |
|