Skip to content

METASPOILT – Beginners Guide – Tutorial on How to use basic commands

08/07/2013

To gain an insight the basic ideas and command flows used, we cover some basics here:

screenshot

*Take a screenshot of the victims desktop

sysinfo

*Get system information about the victims machine

******

To hide inside the victim machine

To be undetected look for a GUI based application such as explorer.exe

ps

(explorer.exe) 1668

migrate 1668

Logic Flow

1. ps provides a list of running process such as explorer.exe

2. migrate moves our hacking into the explorer.exe process space on the victims machine.

3. The GUI hides us… and the victim can’t detect us – as we’re using RAM/memory space dedicated to running Windows.

Advertisements
Leave a Comment

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s

%d bloggers like this: