Description:
Once we compromise a remote system, we can use it as a staging point for further attacks into the network. One of the interesting things the hacker would like to do, is sniff the target network passively and gather more information about it.
We already covered how to use the built-in sniffer module in Metasploit to do this. In this video, we will look at how to install Winpcap and Windump remotely to allow for sniffing. The main challenge in the installation process is to ensure that it happens silently without starting a GUI session on the remote computer.
Raul Siles demonstrates how to do this using the Meterpreter.
Tags: basics ,
Disclaimer: We are a infosec video aggregator and this video is linked from an external website. The original author may be different from the user re-posting/linking it here. Please do not assume the authors to be same without verifying.
Comments: