what i know -> i can exploit the system then through the meterpreter i can create a backdoor .
my question :
can i create a backdoor without meterpreter
then put this backdoor physically in pc and in any time i want i can connect to it ?
Forum Thread: Backdoor ?
- Hot
- Active
-
Forum Thread: How to Track Who Is Sms Bombing Me . 4 Replies
1 mo ago -
Forum Thread: Removing Pay-as-You-Go Meter on Loan Phones. 1 Replies
1 mo ago -
Forum Thread: Hydra Syntax Issue Stops After 16 Attempts 3 Replies
2 mo ago -
Forum Thread: moab5.Sh Error While Running Metasploit 17 Replies
3 mo ago -
Forum Thread: Execute Reverse PHP Shell with Metasploit 1 Replies
4 mo ago -
Forum Thread: Install Metasploit Framework in Termux No Root Needed M-Wiz Tool 1 Replies
5 mo ago -
Forum Thread: Hack and Track People's Device Constantly Using TRAPE 35 Replies
5 mo ago -
Forum Thread: When My Kali Linux Finishes Installing (It Is Ready to Boot), and When I Try to Boot It All I Get Is a Black Screen. 8 Replies
6 mo ago -
Forum Thread: HACK ANDROID with KALI USING PORT FORWARDING(portmap.io) 12 Replies
6 mo ago -
Forum Thread: Hack Instagram Account Using BruteForce 208 Replies
7 mo ago -
Forum Thread: Metasploit reverse_tcp Handler Problem 47 Replies
9 mo ago -
Forum Thread: How to Train to Be an IT Security Professional (Ethical Hacker) 22 Replies
9 mo ago -
Metasploit Error: Handler Failed to Bind 41 Replies
9 mo ago -
Forum Thread: How to Hack Android Phone Using Same Wifi 21 Replies
9 mo ago -
How to: HACK Android Device with TermuX on Android | Part #1 - Over the Internet [Ultimate Guide] 177 Replies
9 mo ago -
How to: Crack Instagram Passwords Using Instainsane 36 Replies
9 mo ago -
Forum Thread: How to Hack an Android Device Remotely, to Gain Acces to Gmail, Facebook, Twitter and More 5 Replies
10 mo ago -
Forum Thread: How Many Hackers Have Played Watch_Dogs Game Before? 13 Replies
10 mo ago -
Forum Thread: How to Hack an Android Device with Only a Ip Adress 55 Replies
11 mo ago -
How to: Sign the APK File with Embedded Payload (The Ultimate Guide) 10 Replies
11 mo ago
-
How To: Scan for Vulnerabilities on Any Website Using Nikto
-
How To: Find Identifying Information from a Phone Number Using OSINT Tools
-
Steganography: How to Hide Secret Data Inside an Image or Audio File in Seconds
-
How To: Intercept Images from a Security Camera Using Wireshark
-
How To: Crack SSH Private Key Passwords with John the Ripper
-
How To: Use Burp & FoxyProxy to Easily Switch Between Proxy Settings
-
How To: Crack Password-Protected Microsoft Office Files, Including Word Docs & Excel Spreadsheets
-
How To: Use Kismet to Watch Wi-Fi User Activity Through Walls
-
Hack Like a Pro: How to Find Directories in Websites Using DirBuster
-
How To: Spy on Traffic from a Smartphone with Wireshark
-
How To: Dox Anyone
-
How to Hack Wi-Fi: Stealing Wi-Fi Passwords with an Evil Twin Attack
-
How To: Exploit EternalBlue on Windows Server with Metasploit
-
How To: Set Up a Wi-Fi Spy Camera with an ESP32-CAM
-
How To: Hack Android Using Kali (Remotely)
-
How To: Use the Chrome Browser Secure Shell App to SSH into Remote Devices
-
How To: Bypass File Upload Restrictions on Web Apps to Get a Shell
-
Hack Like a Pro: Cryptography Basics for the Aspiring Hacker
-
How To: Scan, Fake & Attack Wi-Fi Networks with the ESP8266-Based WiFi Deauther
-
How To: Intercept & Analyze LAN Traffic with a Packet Squirrel & Wireshark
18 Responses
That's exactly what a backdoor is.
ghost_
i know that , but what i need is create backdoor without meterpreter becouse i will put it in pc manually
you what i mean
Netcat is a simple backdoor.
Any of the Metasploit payloads can be installed manually on the system and serve as a backdoor.
but metasploit payloads don't run automatically
it needs to executed
i want this payload to connect to me automatically
i hope i explain what i need ^^
If you are putting it in manually as you say, just execute it manually.
Netcat might be your best bet, though.
if i will execute it , i need to listen on come connections at the same time and i can't do it ^^
and netcat can do what i need
there is a persistence post exploitation module for meterpreter you can run that will run automatically every 10 seconds, provided it isnt blocked by av.
ya i know persistence but this must run through meterpreter it built and depends on the payload i.e you can't use this backdoor if the victim don't execute the payload
Yh misread your question, thought you were talking about your own computer. You could use a BadUSB HID attack to emulate a keyboard and set up a reverse shell through the command line.
all i need is to put a file into a pc just it
this file will be has a apayload and reverse connection to my router when the user log on
all the backdoor we do it from meterpreter
what if someone has physical access to this pc and he need only to put a backdoor
I don't think you understand what a backdoor is. You reject all of our solutions because you think they're not backdoors.
You don't appear to know much, which is fine, this is a great place to learn. But as Cracker Hacker said; you're being given solutions but are rejecting them.
What's not good is you attempting to do things which are beyond your capabilities.
We may seem harsh in telling you to study instead of attempting these things, but the only reason we say this is because in the real world, hacking carries heavy penalties.
It doesn't matter if your intention was just to learn; you can and will be prosecuted if caught, which is almost completely a certainty if you don't know what you're doing.
Please heed what we say, but if you absolutely must attempt these sorts of things, please do so in a controlled lab environment.
I compiled a few good links for someone starting up in the hacking field in this article here. First and foremost, learn Linux and intermediate computing skills, from there it really branches out. I hope you take this as advice more than a personal attack; like I said, not knowing is fine, we're just trying to steer you away from making a mistake.
ghost_
thank you guys ^^ i appreciate your advise =D
and don't worry what i do is in a virtual lab environment
i learn and attempt to do what i learn to know what happen exactly in the real world ^^
but i really appreciate your advice =D
but the problem was me i asked the wrong question
what really i want to do is an autorun payload when the user reboot his pc this payload wil run automatic =D
and i could do to it ^^ i put a shortcut in startup in windows =D
that's it sorry guys for my bad question ^^
but i really know what a backdoor is =D
You could setup the payload as a start up process, I think.
I'm being overdosed on the smileys...
Sounds like you need to migrate to a system process..
done guys i found a solution
-> edit the registry files to autoran the payload
msfvenom is a tool that create payloads for metasploit.
Share Your Thoughts