Making an Automatic .Exe (Solved)

Jan 27, 2015 02:55 AM
Jan 28, 2015 03:51 AM

Hello everyone,

Firstly I would like to introduce myself; i'm indianam, i'm new to hacking, and i'm looking forwards to learning more about penetration testing and the different aspects of cyber security.

Secondly, I have a question regarding making Metasploit .exe's that automatically perform task. For example if I wanted to make a .exe payload that would install a key logger attached to the winlogon.exe process and store the results in a file or send them back to my machine as to find a user credentials without having to crack it, how could I automate it so that all of this could be performed without having to open a meterpreter session and doing it all manually. I may not be able to know when they would run this .exe file so I can't just sit around at my computer all day with a listener open.

I've read up on making a .rc file but I can't figure out how to make it works without need of manual intervention. I feel like this could be very useful if attacking multiple machines at the same time since I wouldn't be able to manage all the sessions at once. Or if you don't know when they will run the .exe it would serve as an automatic way to collect information and run payloads.

Thanks for all the help,

Sincerely,

Indiana Moreau

************Solution**************

With the help of the wonderful people here at Null Byte I was able to solve my issue using the AutoRunScript option which allows to automatically run commands post-exploit. I put the link to an article explaining it a bit better at the bottom of the article. Thanks everyone for all the great help, I am very grateful :)

Just updated your iPhone? You'll find new Apple Intelligence capabilities, sudoku puzzles, Camera Control enhancements, volume control limits, layered Voice Memo recordings, and other useful features. Find out what's new and changed on your iPhone with the iOS 18.2 update.

Related Articles

637263493835297420.jpg

How to Use Zero-Width Characters to Hide Secret Messages in Text (& Even Reveal Leaks)

636455706472146367.jpg

How to Hide DDE-Based Attacks in MS Word

Comments

No Comments Exist

Be the first, drop a comment!