Written by: Pranshu Bajpai
| Find Pranshu on Google+ And LinkedIn
After penetrating a system during testing, it's wise to make a backdoor on the system for easy entry later on. I followed the Metasploit Unleashed examples to make a persistent Meterpreter Service.
So payload was the Meterpreter module, and the 'lhost' and 'lport' belong to my attacking machine.
It created the vbs script in the victim computer's "C:\\WINDOWS\TEMP\" directory, executed this agent with process ID 3676, and manipulated start up Registry entries to make sure it runs after each reboot.
This comment has been removed by a blog administrator.
ReplyDeleteThis comment has been removed by a blog administrator.
ReplyDeleteAwesome, exactly what I’ve been looking for.
ReplyDelete