Hacking a Remote Computer using Metasploit Framework

Today we are going to be hacking a remote computer using metasploit framework!

Hacking a computer in a local area network (LAN) is quite simple since we can issue direct connections among little traffic. Hacking a remote computer on a wide area network, on the other hand, isn’t as simple as you would imagine…

Things to consider during the attack:

  • Anti Virus
  • Firewall
  • Intrusion Detection System
  • Intrusion Prevention System
  • Latency
  • Routers

Let’s face it: it’s a wild west out there… anything goes. All these devices will surely slow down the attack or perhaps even completely prevent it!

In order to make sure the attack endures this harsh environment we need to account for some type of encryption on our part, for this we will use vanish (seen previously) to create a backdoor. Let’s use a reverse tcp connection to the secure http port (443) back on the attacker.

This port will need to be forwarded if it is a routed network (as most are)… you can see how to do this in the video. 😉

Once the victim executes this backdoor he will trigger a connection back to the attacker’s machine (forwarded on the public IP address of course).

Since most routers allow connections on ports 80 and 443 using this payload should be fine.

Click here to download vanish: [ DOWNLOAD ]

Check out the video!

P.S: The settings shown are the ones that I played with and managed to get to work, if you have other payloads or parameters, etc. that were useful to you, feel free to share in the comments sections below!

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Google+ photo

You are commenting using your Google+ account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )


Connecting to %s