Guys
I'm trying to do a backdoor; my victim uses a Windows 7
I got his IP, but I only got an ethernet IP (RHOST)
Which exploit/payload should I use?
Forum Thread: Need Help (Metasploit - Kali Linux)
- Hot
- Active
-
Forum Thread: How Can I Bypass My College Internet Portal to Access All the Sites.. 3 Replies
6 hrs ago -
Forum Thread: How to Train to Be an IT Security Professional (Ethical Hacker) 23 Replies
5 days ago -
How to: Sign the APK File with Embedded Payload (The Ultimate Guide) 11 Replies
6 days ago -
Forum Thread: How to Track Who Is Sms Bombing Me . 4 Replies
3 wks ago -
Forum Thread: Removing Pay-as-You-Go Meter on Loan Phones. 1 Replies
1 mo ago -
Forum Thread: Hydra Syntax Issue Stops After 16 Attempts 3 Replies
1 mo ago -
Forum Thread: moab5.Sh Error While Running Metasploit 17 Replies
2 mo ago -
Forum Thread: Execute Reverse PHP Shell with Metasploit 1 Replies
3 mo ago -
Forum Thread: Install Metasploit Framework in Termux No Root Needed M-Wiz Tool 1 Replies
4 mo ago -
Forum Thread: Hack and Track People's Device Constantly Using TRAPE 35 Replies
4 mo ago -
Forum Thread: When My Kali Linux Finishes Installing (It Is Ready to Boot), and When I Try to Boot It All I Get Is a Black Screen. 8 Replies
5 mo ago -
Forum Thread: HACK ANDROID with KALI USING PORT FORWARDING(portmap.io) 12 Replies
6 mo ago -
Forum Thread: Hack Instagram Account Using BruteForce 208 Replies
6 mo ago -
Forum Thread: Metasploit reverse_tcp Handler Problem 47 Replies
8 mo ago -
Metasploit Error: Handler Failed to Bind 41 Replies
8 mo ago -
Forum Thread: How to Hack Android Phone Using Same Wifi 21 Replies
8 mo ago -
How to: HACK Android Device with TermuX on Android | Part #1 - Over the Internet [Ultimate Guide] 177 Replies
8 mo ago -
How to: Crack Instagram Passwords Using Instainsane 36 Replies
9 mo ago -
Forum Thread: How to Hack an Android Device Remotely, to Gain Acces to Gmail, Facebook, Twitter and More 5 Replies
9 mo ago -
Forum Thread: How Many Hackers Have Played Watch_Dogs Game Before? 13 Replies
9 mo ago
-
Hack Like a Pro: How to Create a Virtual Hacking Lab
-
How To: Enumerate SMB with Enum4linux & Smbclient
-
How To: Dox Anyone
-
How To: Fully Anonymize Kali with Tor, Whonix & PIA VPN
-
How To: Find Identifying Information from a Phone Number Using OSINT Tools
-
How To: Use Burp & FoxyProxy to Easily Switch Between Proxy Settings
-
How To: Use Kismet to Watch Wi-Fi User Activity Through Walls
-
How To: Check if Your Wireless Network Adapter Supports Monitor Mode & Packet Injection
-
How to Hack Wi-Fi: Stealing Wi-Fi Passwords with an Evil Twin Attack
-
How To: Create Rainbow Tables for Hashing Algorithms Like MD5, SHA1 & NTLM
-
Mac for Hackers: How to Install Kali Linux as a Virtual Machine
-
How To: Brute-Force Nearly Any Website Login with Hatch
-
How to Hack Bluetooth, Part 1: Terms, Technologies, & Security
-
How To: Install Kali Linux as a Portable Live USB for Pen-Testing & Hacking on Any Computer
-
How To: Inconspicuously Sniff Wi-Fi Data Packets Using an ESP8266
-
How To: Use Mitaka to Perform In-Browser OSINT to Identify Malware, Sketchy Sites, Shady Emails & More
-
How To: Use MinGW to Compile Windows Exploits on Kali Linux
-
How To: Enumerate MySQL Databases with Metasploit
-
The Hacks of Mr. Robot: How to Spy on Anyone's Smartphone Activity
-
How To: Find OSINT Data on License Plate Numbers with Skiptracer
2 Responses
There are two things you can do. One is to do more recon to see if the victim has exploitable vulnerabilities. Remote code execution vulnerabilities to be more specific.
The other thing you can do is create a malicious file that you send to the victim and hope they open the file.
The first one is more difficult. If on the same network as you, it's easier but still can be difficult. If you are not on the same network, it's probably not very likely to work due to firewalls.
Most people use the second way. It can take some good social engineering tricks to get them to open the file, but works well if you are smarter than the victim.
Thank you very much dude
Share Your Thoughts