Client Side Exploitation
◾
229
Step 6
—Finally, it will ask for the port on which to listen for connections; enter any random
port that is not in use.
We are now done with creating our executable. All you need to do is to burn it to a USB and
load it on the victim’s machine. Once done, it will automatically execute if autorun.inf is enabled,
and you will get a reverse connection.
Dostları ilə paylaş: