Today we are going to be hacking a remote computer using metasploit framework!
Hacking a computer in a local area network (LAN) is quite simple since we can issue direct connections among little traffic. Hacking a remote computer on a wide area network, on the other hand, isn’t as simple as you would imagine…
Things to consider during the attack:
- Anti Virus
- Intrusion Detection System
- Intrusion Prevention System
Let’s face it: it’s a wild west out there… anything goes. All these devices will surely slow down the attack or perhaps even completely prevent it!
In order to make sure the attack endures this harsh environment we need to account for some type of encryption on our part, for this we will use vanish (seen previously) to create a backdoor. Let’s use a reverse tcp connection to the secure http port (443) back on the attacker.
This port will need to be forwarded if it is a routed network (as most are)… you can see how to do this in the video. 😉
Once the victim executes this backdoor he will trigger a connection back to the attacker’s machine (forwarded on the public IP address of course).
Since most routers allow connections on ports 80 and 443 using this payload should be fine.
Click here to download vanish: [ DOWNLOAD ]
Check out the video!