How To Hack Victim,s Computer With Nmap And Metasploit | Learn How To Hack - Ethical Hacking and security tips

Subscribe & Don,t Miss A Free Hacking Course| Receive Daily Updates

Enter your email address:

How To Hack Victim,s Computer With Nmap And Metasploit



Today I am writing a tutorial on hacking with Nmap with Metasploit. First d/l Metasploit  from the official website,Link:
Code:
http://www.metasploit.com/ 
Let  all that install, and towards the end of the installation it will ask if you would like Nmap installed also, 
choose yes. Once you have that installed the  Metasploit screen will  open up as shown below...


Now type db_create

Once you have typed that type nmap

This loads nmap, as shown below....



You need to configure your scan now, I usually do a simple -sT -sV scan which will tell us the open ports and services running on the victims computer, Now type nmap -sT -sV xxx.xxx.xxx.x (X's being victims Ip number), Demonstrated below.



Now give it 5 minutes to complete the scan,Once that is complete if your lucky you should get a response like this...



This is basically a list of the open ports and services running on the target machine, Now the handy feature of the metasploit 3.3 framework is the autopwn feature, this basically searches and runs all matching exploits in the Metasploit database against the target machine and if successful will create a shell or similar privilege for the attacker.

Now once you have the nmap results delivered back to you showing the open ports and services type db_autopwn -p -t -e , From this point you will either have access to the victims computer through a successfully launched exploit or you will get a response saying the machine wasn't vulnerable to any of the exploits in the Metasploit database. Unfortunately on this particular machine I found it wasn't vulnerable as the image below proves.Good luck.

...........................................................................................................................................................................................
............................................................................................................................................................................................
............................................................................................................................................................................ ..............




Share your views...

3 Respones to "How To Hack Victim,s Computer With Nmap And Metasploit"

Rahul Sharma said...

Sir how i could add tabs to my blog. Please sent me steps on [email protected]


October 30, 2010 at 7:02 AM
Adnan Anjum said...

go to design then click on edit html
after that you need to do some modifications for example without quots
"CONTACT US"
this will add a tab of contact us
keep visiting
Regards,
Adnan Anjum

parth said...

hi i am using norton 2010 nis n it quarantines the files of metasploit consedering as trojan ...
metasploit have warned about it but what should be done to avoid this pls help ...


October 31, 2010 at 11:10 AM

Post a Comment

 

© 2011 Learn How To Hack - Ethical Hacking and security tips All Rights Reserved Learn Hacking Online hackguide4u.com