Skip to content

METASPOILT – Beginners Guide – Tutorial on How to use basic commands


To gain an insight the basic ideas and command flows used, we cover some basics here:


*Take a screenshot of the victims desktop


*Get system information about the victims machine


To hide inside the victim machine

To be undetected look for a GUI based application such as explorer.exe


(explorer.exe) 1668

migrate 1668

Logic Flow

1. ps provides a list of running process such as explorer.exe

2. migrate moves our hacking into the explorer.exe process space on the victims machine.

3. The GUI hides us… and the victim can’t detect us – as we’re using RAM/memory space dedicated to running Windows.

Leave a Comment

Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out /  Change )

Google+ photo

You are commenting using your Google+ account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )


Connecting to %s

%d bloggers like this: