From the course: Kali Linux Essential Training
Unlock the full course today
Join today to access over 24,600 courses taught by industry experts.
Exploiting Windows with Venom - Linux Tutorial
From the course: Kali Linux Essential Training
Exploiting Windows with Venom
- [Instructor] Let's take a look at how an adversary would exploit a Window systems using a phishing attack. We can use the Msfvenom tool to create a payload for this. We can generate payloads for a number of connection types, and the one we'll use now is a Metasploit shell called interpreter. Let's create the payload, Msfvenom minus P, and the payload we're going to use is windows/interpreter/reverse_tcp, and we'll set our listener IP address to 10.0.2.100, which is our Carly system, and the port to 4444. We want the format of the payload to be executable, and we want the name to be shelly.exe. Okay, that's created, so all we need to do now is get this onto the target system. In reality, we'd do this with a phishing attack, perhaps as an attachment to get the user to click on it, and we can do this for the purpose of the course by setting up a web server in Python. And we'll use the Python 3 web server http.server, and…
Practice while you learn with exercise files
Download the files the instructor uses to teach the course. Follow along and learn by watching, listening and practicing.