how to use a rootkits on windows os,by uploading it from a meterpreter session?or how are they used to get backdoor?or do they just hide processes?what are some good rootkits?i dont know much about it,just trying a backdoor that should connect back like persistence but the persistence script is being detected by Av!!!so is rootkit an alternate option?what would you suggest?
- Hot
- Active
-
Forum Thread: What Are Some Good Budget Laptops for Pentestin 12 Replies
2 days ago -
How to: Sign the APK File with Embedded Payload (The Ultimate Guide) 8 Replies
3 days ago -
Forum Thread: Hack Instagram Account Using BruteForce 193 Replies
3 days ago -
Forum Thread: Create and Use Android/Meterpreter/reverse_tcp APK with Msfvenom? 117 Replies
5 days ago -
Forum Thread: How Do I Access Different Directories Within Android via Meterpreter 5 Replies
1 wk ago -
Forum Thread: Best Programming Language? 8 Replies
1 wk ago -
Forum Thread: HACK ANDROID with KALI USING PORT FORWARDING(portmap.io) 4 Replies
1 wk ago -
Forum Thread: Fix Meterpreter Problem 2 Replies
1 wk ago -
Forum Thread: Hack and Track People's Device Constantly Using TRAPE 31 Replies
2 wks ago -
Forum Thread: Need Help with FatRat Over WAN 1 Replies
2 wks ago -
Forum Thread: Kali Linux Boot Error 8 Replies
2 wks ago -
Forum Thread: I Want to Hack in to My Friends System Through his wifi router i am controlling 8 Replies
2 wks ago -
Forum Thread: Kali linux command error. Kindly help 3 Replies
2 wks ago -
Forum Thread: How to Create a Python Remote Keylogger for Facebook 27 Replies
2 wks ago -
Forum Thread: Kali Linux Handshake Porblem 2 Replies
2 wks ago -
Forum Thread: Port Forwarding Problem in Metasploit Can't Establish Connection (WAN) 3 Replies
3 wks ago -
Forum Thread: GMail Brute Force Dictionary Attack Script 31 Replies
4 wks ago -
Forum Thread: Msfvenom Android Exploitation Outside LAN? 12 Replies
4 wks ago -
Forum Thread: How to decrypt .CAP file of handshake during WiFi attack 2 Replies
1 mo ago -
Forum Thread: Make a Phishing Page for Harvesting Credentials Yourself 7 Replies
1 mo ago
-
How To: Clear the Logs & Bash History on Hacked Linux Systems to Cover Your Tracks & Remain Undetected
-
How To: Make Spoofed Calls Using Any Phone Number You Want Right from Your Smartphone
-
Android for Hackers: How to Turn an Android Phone into a Hacking Device Without Root
-
How To: Hack Android Using Kali (Remotely)
-
How To: Top 10 Things to Do After Installing Kali Linux
-
How to Hack Wi-Fi: Cracking WPA2-PSK Passwords Using Aircrack-Ng
-
How to Hack Wi-Fi: Stealing Wi-Fi Passwords with an Evil Twin Attack
-
How To: Brute-Force Nearly Any Website Login with Hatch
-
How to Hack Wi-Fi: Cracking WPA2 Passwords Using the New PMKID Hashcat Attack
-
How To: Phish for Social Media & Other Account Passwords with BlackEye
-
How To: Check if Your Wireless Network Adapter Supports Monitor Mode & Packet Injection
-
How To: Crack Password-Protected ZIP Files, PDFs & More with Zydra
-
How To: Crack Password-Protected Microsoft Office Files, Including Word Docs & Excel Spreadsheets
-
How To: Gain SSH Access to Servers by Brute-Forcing Credentials
-
How To: Hunt Down Social Media Accounts by Usernames with Sherlock
-
How To: Scan for Vulnerabilities on Any Website Using Nikto
-
How To: Exploit EternalBlue on Windows Server with Metasploit
-
Hack Like a Pro: How to Crack Online Web Form Passwords with THC-Hydra & Burp Suite
-
How To: Find Identifying Information from a Phone Number Using OSINT Tools
-
How To: Crack Shadow Hashes After Getting Root on a Linux System
2 Responses
One option is to create an undetected file with Shellter. Upload it to the computer, place it in an obscure folder. Edit the registry to start the file on startup. Now you should get an undetected Meterpreter session each time the computer turns on. It can take some time to figure out how to do it exactly but it's possible. I've done it as a test on my systems.
you mean after the victim is compromised?im lil confused.could you elaborate?
i created a backdoor with fatrat.it doesnt get detected,but when i try persistence and when machine reboots,av picks it up.is there a way to permanently disable av? otherwise?or a persistence that doesnt get detected?
thanx for reply btw
Share Your Thoughts