So i've recently remebered the Utorrent bitmine and i was wondering if somthing like that is possible using metasploit?
i mean for example if i have a meterpreter shell open to the victim how would i got about mining in the back round ?
Thanks
So i've recently remebered the Utorrent bitmine and i was wondering if somthing like that is possible using metasploit?
i mean for example if i have a meterpreter shell open to the victim how would i got about mining in the back round ?
Thanks
3 Responses
You are asking us how to steal. This is not the place to ask such questions.
to steal is not my intent i am simply just wondering how they did it? without being seen sooner
I agree with brehnt.
Share Your Thoughts