2018Microsoft claims that windows 10 has fixed all security vulnerabilities. Then how can we hack a windows pc is that even possible now? A trojan or a backdoor can give access bitcoin port forwarding target machine remotely. I’m not going too deep in explaining what a trojan is.
Here we gonna use reverse_tcp trojan. This is a specially crafted malware that establish a remote connection to the hacker’s machine over Transition Control Protocol from the victim machine. This allows the hacker to breach into the machine and take full control over it. Metasploit framework is one of the best tool that i love in kali linux. It has both handler and payload generator.
Once the payload get executed on the target machine while the we are on listening mode in the handler section it spawns a meterpreter shell. This meterpreter shell allow us to communicate with the target system and execute shell commands. Compared to normal shell meterpreter has plenty of options. This step is very important when your target is over the internet or WAN. Ignore this step if your target is on same LAN. To hack a pc over the internet means you have to communicate in both direction. 444 and ip to your public IP or local IP depending on your target.
The generated trojan will try to connect to This IP and port when its executed. A trojan will be generated in the desktop. Wait for a minute, msfconsole will come up. Use handler then, set payload and port.
Distributing the raw exe file is a bad idea, better encode it and attach with a normal application or a game or even email. Meterpreter session allows you to execute system commands, networking commands, spy the screen and much more. This whole process is simple but, the toughest part is getting the trojan in to the target user. Attaching the file along with games works great. Read my blog on Privilege escalation in windows to know how to get admin privilege in a hacked system. I’m a computer enthusiast basically and i love to write blogs on tech issues and cyber security.