Hacking Into Windows 10 Using Metasploit Framework
Hacking Into Windows 10 Using Metasploit Framework
Using Metasploit
Framework
Sheikh Mohammed Aaftab
THIS ARTICLE ASSUMES THE INSTALLATION OF KALI LINUX HAS BEEN DONE
AND IS REACHABLE THROUGH A BRIDGED CONNECTION FROM A WINDOWS MACHINE
ON VMWARE.
Generate the payload using msfvenom, set the port to 4444 and IP
to your public IP or local IP depending on your target. The
generated Trojan will try to connect to this IP and port when its
executed. following command will generate the Trojan in .exe
format.
ifconfig
A Trojan will be generated in the desktop. keep it aside and move
on to handler section. you would use msfvenom as shown in the
command below:
The next prompt will require you to enter the payload, either a
custom or a listed one. You should select a listed one by typing “L”,
unless you want to proceed with your own custom payload. Select
the index position of the payload to use. We need a
Meterpreter_Reverse_TCP, so we will have to go with “1.”
Enter LHOST and LPORT and press Enter. Shellter will run to
completion and request you to press Enter.
At this point, the executable you provided will have been made
undetectable to antivirus programs.
The screenshot below displays the output. The reverse TCP handler
should begin waiting for a connection.
The next step is to execute it from a Windows perspective. In a real-
world practical situation, this will require social engineering skills.
Nevertheless, I uploaded to drive and copy
the acrobatreaderpro.exe to a Windows system within the same
network as the Kali system.
Privilege Escalation
Now that we are within the target machine, why not perform some
persistence to remain within?
Persistence
You can list the process of the target box, browse through the
system folders, make directory and upload Trojan.
Conclusion
Hackers are not limited in what they can use the framework for. For
instance, it can also be used to perform information gathering and
pivoting through compromised networks. Since our whole objective
here was to create an undetectable payload, antivirus software is
not really a good option for protecting against these types of file
extension spoofing attacks.
One thing you can do is just put on your magnifying glass when
looking at files you download off the internet. In this article we have
seen how the Metasploit Framework can be used to compromise a
Windows 10 machine to gain a Meterpreter session. We have used
Shellter to FUD our malicious executable to bypass the Windows 10
antivirus and performed privilege escalation to gain more rights on
our compromised machine.