Malicious PDF as an Exploit
A few days ago i created a malicious unsuspecting PDF using OTW's how-to. I created it using Metasploit. I have a few questions about the exploit and accessing it.
1.How can now that the victim opened it?
2.After he opened it How do i access his system?
3.If i create a persistent back door while I'm in his system can i access it when ever i want or only while his system is on?
4.I sent the file via Skype on my windows laptop.The victim didn't open it yet. Can i turn off The Linux PC that i created the file from or do i have to wait till the victim opens it?
I am still a beginner and i only now a bit of java and html but i am hoping to learn more and more about hacking because i find it very interesting!
Any answers or links are Appreciated :) .