03-31-2012, 05:12 PM
Today tutorial basics come from payload, so first thing which come in your mind is
"what is payload?"
[color=#FF4500]A payload is code that we want the system to execute and that is to be selected and delivered by the Framework. For example, a reverse shell is a payload that creates a connection from the target machine back to the attacker as a Windows command prompt.A payload could also be something as simple as a few commands to be executed on the target operating system.
Step 1: Go to Backtrack 5 and open the terminal , i had done it with BackTrack5 R2 , so after starting terminal now write below write command ....
Hidden Content
and then press enter key.Now again type..
Hidden Content
again press enter key. For live example see below pic...
Hidden Content
When you go there you see msf.exe file like below pic...
Hidden Content
when you did it then you see it showing connection...
192.168.0.13:808>>>>>>>>192.168.0.14:49793
Which means my system IP 192.168.0.13 which default Port 808 now connected with my victim Hemant System which IP is 192.168.0.14 and port 49793 . Now you enter in your victim System, see below pic...
Hidden Content
And Press Enter Key see below pic...
Hidden Content
And Press Enter Key, see below pic in which all running process show you...
Hidden Content
And press Enter key, where c:\\windows\\system32\\sethc.exe is file location and name.see below pic...
Hidden Content
and press enter key, see below pic...
Hidden Content
[To see links please register here]
[/hide][/hide]
[/hide]
[/hide]
[/hide]
[/hide]
[/hide]
[/hide]
[/hide]
[/hide]
[/hide]
[/hide]
[/hide]
[/hide]