METASPOILT – Beginners Guide – Tutorial on How to use basic commands
To gain an insight the basic ideas and command flows used, we cover some basics here:
*Take a screenshot of the victims desktop
*Get system information about the victims machine
To hide inside the victim machine
To be undetected look for a GUI based application such as explorer.exe
1. ps provides a list of running process such as explorer.exe
2. migrate moves our hacking into the explorer.exe process space on the victims machine.
3. The GUI hides us… and the victim can’t detect us – as we’re using RAM/memory space dedicated to running Windows.