From the course: Kali Linux Essential Training

Unlock the full course today

Join today to access over 24,600 courses taught by industry experts.

Exploiting Windows with Venom

Exploiting Windows with Venom - Linux Tutorial

From the course: Kali Linux Essential Training

Exploiting Windows with Venom

- [Instructor] Let's take a look at how an adversary would exploit a Window systems using a phishing attack. We can use the Msfvenom tool to create a payload for this. We can generate payloads for a number of connection types, and the one we'll use now is a Metasploit shell called interpreter. Let's create the payload, Msfvenom minus P, and the payload we're going to use is windows/interpreter/reverse_tcp, and we'll set our listener IP address to 10.0.2.100, which is our Carly system, and the port to 4444. We want the format of the payload to be executable, and we want the name to be shelly.exe. Okay, that's created, so all we need to do now is get this onto the target system. In reality, we'd do this with a phishing attack, perhaps as an attachment to get the user to click on it, and we can do this for the purpose of the course by setting up a web server in Python. And we'll use the Python 3 web server http.server, and…

Contents