While hacking, it's all about staying anonymous and untraceable. Most good hackers would thus chain proxies or root a series of boxes and use them as staging points for further attacks. As one can imagine, once a remote box is 0wned, it is important to get the right tools on it, in order to use it for attacking other systems. Now what tool could be better for rooting systems than metasploit? :) In this video, xsploitedsecurity
shows us how to deploy the entire metasploit framework as a payload and execute it on the remote machine which can then be used to further launch exploits remotely.
This is a recommended watch! Very nice demo!
Tags: basics ,
Disclaimer: We are a infosec video aggregator and this video is linked from an external website. The original author may be different from the user re-posting/linking it here. Please do not assume the authors to be same without verifying.