what i know -> i can exploit the system then through the meterpreter i can create a backdoor .
my question :
can i create a backdoor without meterpreter
then put this backdoor physically in pc and in any time i want i can connect to it ?
Forum Thread: Backdoor ?
- Hot
- Active
-
Forum Thread: Kali linux command error. Kindly help 2 Replies
17 hrs ago -
How to: Crack Instagram Passwords Using Instainsane 31 Replies
1 day ago -
Forum Thread: When to Use Reverse Shell and Bind Shell? 5 Replies
3 days ago -
Forum Thread: Fluxion Not Working 6 Replies
3 days ago -
Forum Thread: Hacking Stream (LIVE) 10 Replies
4 days ago -
Forum Thread: Blind SQL Injection 6 Replies
4 days ago -
Forum Thread: Hacking Facebook,Twitter,Instagram Account Passwords with BruteForce 160 Replies
1 wk ago -
Forum Thread: Can C Programming Help Me for Hacking or Pen Testing. 10 Replies
1 wk ago -
Forum Thread: I Want to Hack in to My Friends System Through his wifi router i am controlling 7 Replies
1 wk ago -
Forum Thread: How to Use the Exploits Found in Vega Scan 3 Replies
2 wks ago -
Forum Thread: Can I Send a File to a Computer Using Ip Address 5 Replies
2 wks ago -
Forum Thread: How to Use NGROK in a Reverse_Tcp Attack? 20 Replies
2 wks ago -
Forum Thread: Problem with Hacking Webserver with Armitage 11 Replies
2 wks ago -
Forum Thread: Metasploit - Embedding an Android Payload into a PDF? 7 Replies
2 wks ago -
Forum Thread: Creating an Completely Undetectable Executable in Under 15 Minutes! 35 Replies
2 wks ago -
Forum Thread: How to Hack an Android Device with Only a Ip Adress 43 Replies
2 wks ago -
Forum Thread: Metasploit Use Domain Name as RHOST 4 Replies
2 wks ago -
Forum Thread: Make a Phishing Page for Harvesting Credentials Yourself 4 Replies
2 wks ago -
Forum Thread: HELP I Created an Apk for Hacking My Phone Using Kali Linux in Virtual Box How Can I Install That Apk on My Phone 14 Replies
3 wks ago -
Forum Thread: How to Get Social Media Accounts and Real Name from the Footprints Left Behind by a Phone Number 14 Replies
3 wks ago
-
How To: Automate Remote SSH Control of Computers with Expect Scripts
-
How To: This Master Course Bundle on Coding Is Just $34.99
-
How to Hack Wi-Fi: Cracking WPA2 Passwords Using the New PMKID Hashcat Attack
-
How To: Hack Android Using Kali (Remotely)
-
How To: Brute-Force Nearly Any Website Login with Hatch
-
How To: Upgrade a Normal Command Shell to a Metasploit Meterpreter
-
Android for Hackers: How to Turn an Android Phone into a Hacking Device Without Root
-
How To: Crack Shadow Hashes After Getting Root on a Linux System
-
How To: 4 Ways to Crack a Facebook Password & How to Protect Yourself from Them
-
How To: Check if Your Wireless Network Adapter Supports Monitor Mode & Packet Injection
-
How to Hack Wi-Fi: Cracking WPA2-PSK Passwords Using Aircrack-Ng
-
How To: Crack SSH Private Key Passwords with John the Ripper
-
How To: The Hacks Behind Cracking, Part 1: How to Bypass Software Registration
-
How To: Crack Password-Protected Microsoft Office Files, Including Word Docs & Excel Spreadsheets
-
How To: Top 10 Things to Do After Installing Kali Linux
-
How to Hack Wi-Fi: Stealing Wi-Fi Passwords with an Evil Twin Attack
-
How To: Buy the Best Wireless Network Adapter for Wi-Fi Hacking in 2019
-
How To: Gain SSH Access to Servers by Brute-Forcing Credentials
-
How To: Bypass File Upload Restrictions on Web Apps to Get a Shell
-
How To: Automate Wi-Fi Hacking with Wifite2
18 Responses
That's exactly what a backdoor is.
ghost_
i know that , but what i need is create backdoor without meterpreter becouse i will put it in pc manually
you what i mean
Netcat is a simple backdoor.
Any of the Metasploit payloads can be installed manually on the system and serve as a backdoor.
but metasploit payloads don't run automatically
it needs to executed
i want this payload to connect to me automatically
i hope i explain what i need ^^
If you are putting it in manually as you say, just execute it manually.
Netcat might be your best bet, though.
if i will execute it , i need to listen on come connections at the same time and i can't do it ^^
and netcat can do what i need
there is a persistence post exploitation module for meterpreter you can run that will run automatically every 10 seconds, provided it isnt blocked by av.
ya i know persistence but this must run through meterpreter it built and depends on the payload i.e you can't use this backdoor if the victim don't execute the payload
Yh misread your question, thought you were talking about your own computer. You could use a BadUSB HID attack to emulate a keyboard and set up a reverse shell through the command line.
all i need is to put a file into a pc just it
this file will be has a apayload and reverse connection to my router when the user log on
all the backdoor we do it from meterpreter
what if someone has physical access to this pc and he need only to put a backdoor
I don't think you understand what a backdoor is. You reject all of our solutions because you think they're not backdoors.
You don't appear to know much, which is fine, this is a great place to learn. But as Cracker Hacker said; you're being given solutions but are rejecting them.
What's not good is you attempting to do things which are beyond your capabilities.
We may seem harsh in telling you to study instead of attempting these things, but the only reason we say this is because in the real world, hacking carries heavy penalties.
It doesn't matter if your intention was just to learn; you can and will be prosecuted if caught, which is almost completely a certainty if you don't know what you're doing.
Please heed what we say, but if you absolutely must attempt these sorts of things, please do so in a controlled lab environment.
I compiled a few good links for someone starting up in the hacking field in this article here. First and foremost, learn Linux and intermediate computing skills, from there it really branches out. I hope you take this as advice more than a personal attack; like I said, not knowing is fine, we're just trying to steer you away from making a mistake.
ghost_
thank you guys ^^ i appreciate your advise =D
and don't worry what i do is in a virtual lab environment
i learn and attempt to do what i learn to know what happen exactly in the real world ^^
but i really appreciate your advice =D
but the problem was me i asked the wrong question
what really i want to do is an autorun payload when the user reboot his pc this payload wil run automatic =D
and i could do to it ^^ i put a shortcut in startup in windows =D
that's it sorry guys for my bad question ^^
but i really know what a backdoor is =D
You could setup the payload as a start up process, I think.
I'm being overdosed on the smileys...
Sounds like you need to migrate to a system process..
done guys i found a solution
-> edit the registry files to autoran the payload
msfvenom is a tool that create payloads for metasploit.
Share Your Thoughts