I have installed metasploit on a victims computer that is not connected to internet but how do I get their ip? Do I need his ip to enable webcam or something on Metasploit? I know I need it for Armitage.
- Hot
- Results
-
How To: Mix gel-based food icing colors for cake decorating
-
How To: Apply, set, and remove natural food-based dye
-
News: Tiny Food-Based Works of Art to Drool Over
-
News: Scan Your Food for E. Coli and Salmonella with This Smartphone-Based Bacteria Detector
-
How To: Make a milk & rice pudding with the BBC's Hairy Bikers
-
How To: Make a Portuguese Man-of-War recipe with the BBC
-
How To: Make a delicious chicken salad with Martha Stewart
-
How To: Make a mirepoix flavor base
-
How To: Make a perfectly thin & crispy pizza pie
-
How To: High-Tech Plant Burgers Look, Feel & Taste Just Like Real Meat
-
How To: Make a creamy chicken pot pie with Food Network
-
How To: Follow the Volumetrics weight loss plan
-
How To: Use Mason Jars with a Blender
-
How To: Reheat food correctly
-
How To: Make a raw marinated kale cole slaw
-
How To: Prepare penne pasta with spicy sausage ragu
-
How To: Cook Béchamel white sauce with milk and flour
-
How To: Make Your Own Sriracha at Home
-
How To: Make Chinese crab soup with Kai
-
How To: Make straight forward bechamel sauce
-
How To: Use Apple Intelligence's Image Playground to Craft Custom Drawings and Animations for Almost Anything You Can Think Of
-
How To: See Passwords for Wi-Fi Networks You've Connected Your Android Device To
-
How To: Generate Text, Images, and Insights with Apple Intelligence's Built-in ChatGPT Integration
-
How To: Remove Unwanted Objects, People, and Distractions in Photos on Your iPhone, iPad, or Mac
-
How To: Create an Admin User Account Using CMD Prompt (Windows)
-
How To: Keep Your Night Vision Sharp with the iPhone's Hidden Red Screen
-
How To: Use FaceTime's Secret Hand Gestures and Reaction Buttons to Add Animated On-Screen Effects to Your Video Feed
-
Warning: Sensitive Info You Black Out in Images Can Be Revealed with a Few Quick Edits on Your iPhone
-
How To: Download and Install iOS 18.2 Beta or iPadOS 18.2 Beta to Try New iPhone or iPad Features First
-
How To: Make Spoofed Calls Using Any Phone Number You Want Right from Your Smartphone
-
How To: The Best Investigatory Projects in Science: 16 Fun & Easy Ideas to Kickstart Your Project
-
How To: Make Siri Say Whatever You Want Every Time You Connect Your iPhone to a Charger
-
How To: Create a Basic Attendance Sheet in Excel
-
How To: Reverse Engineering with Radare2 (A Quick Introduction)
-
How To: 3 Ways to Delete Facebook Without Root — Even if It Was Preinstalled on Your Phone
-
How To: Dial These Secret Codes to See if Someone Is Hijacking Calls & Texts on Your iPhone
-
How To: CC in a Physical Business Letter
-
How To: See What Traffic Will Be Like at a Specific Time with Google Maps
-
How To: 100+ Secret Dialer Codes for Your iPhone
-
How To: Lock and Hide Apps on Your iPhone or iPad — The Official Way
6 Responses
seriously dude...if u have already have access to the victim's laptop ...why do u want to hack it ..u have it in your hands
and let us assume u want to hack it ..why did u install the metasploit framewrk onn hix computer...who is going to attack the other mate ????
all u have to do is to install the metasploit to ur computer ( u r the attacker not him ) then generate a payload and send it to the victim ...u can also have the ip useing the nmap tool
hope that answers ur Q
Do I need my metasploit (or computer) running when i install the payload on their computer?
Hey there...
Metasploit is a framework of tools that can be used to exploit vulnerabilities in a system. Armitage is more or less a gui of metasploit. Neither of them are exploits or payloads themselves, but a means of finding, creating, and interacting with one.
As mentioned by mohammad, you could use metasploit to generate a payload to exploit a specific vulnerability in an OS and install that on the targets system. This would most likely require you to know your public ip address if your not on the targets LAN so the payload knows what system it should be relaying data to.
If you want to know your public ip or someone elses and have access to the machine, you can simply punch into google "whatsmyip" and it will tell you. Without access to the system or network the only thing i can suggest is social engineering.
Do I need my metasploit (or computer) running when i install the payload on their computer?
Not necessarily.. you should be able to start the listener whenever you want as long as the payload is installed and running.
is it always going to be running?
Share Your Thoughts