Description: When a system is exploited with metasploit, attacker gets a meterpreter session or remote shell depending upon payload selected but the main problem with this is, when victim shutdown the computer everything get lost. Some time it may be very difficult to repeat this process to get the session again.
This video is all about how to get a persistence backdoor on victim so that attacker gets the meterpreter session again when victim reboot it. Backdoor created executes after every 5 second when victim logs on. We can use macchanger to cover our track. For this purpose attacker start a listener and select a payload , which in this video are multi/handler and windows/meterpreter/reverse_tcp respectively.
Source : GH05T Productions from Youtube
Tags: backdoor , metasploit ,
Disclaimer: We are a infosec video aggregator and this video is linked from an external website. The original author may be different from the user re-posting/linking it here. Please do not assume the authors to be same without verifying.
we can also do it by creating .exe for payload and upload it in the startup folder of victim (window). every time victim machine will be rebooted the payload will get executed.
Main difficulty is how you can maintain your backdoor. Lets see, If you create a backdoor still almost 90% chances that backdoor going to detect by AV's. So is there any way to bypass that antivirus software ? anyone Please ?