00:00What kind of file is your full access to a hacker?
00:08Your files, your images, your account, all you have to use hacker.
00:13So, today I will tell you how to use a Windows operating system.
00:16But, if you don't subscribe, don't forget to subscribe.
00:18If you don't like it, don't forget to like it.
00:19Let's start the video.
00:20So, this is why you have three things to use.
00:22First of all, you have to use a Linux machine.
00:24You have to use a Linux machine.
00:25You have to use a metal machine.
00:26You have to use a metal machine.
00:28So, we will use a machine, with an manufacturer to use a standalone machine.
00:31So, for the members of the file, the member will be attacked.
00:33And I will open this power to a file.
00:34After opening this here.
00:35What do we need to do?
00:36We want to open our terminal.
00:37After opening the terminal, we have to bring the root access.
00:40We need to do the root access.
00:41We need to do the root access.
00:42I need to do the root access and control the CD.
00:43And I need to change it from the CD.
00:45After pulling it out, we have to create a payload.
00:47We need to send a machine to our victim machine.
00:49So, when the victim machine is opened up.
00:50Our machine will bring the full access.
00:53We need to use the full access to this.
00:54For this, we will use Metal Floyd framework.
00:56That we will use a machine.
00:57been a msf-winum so here you have this command type here you have to type
01:01here you have to type this , for instance we have to load
01:04create windows in the meter meter session with reverse TCP
01:08and a multiply 86 64 beta if you have to type here
01:14so here we have two , platform where we have windows we have to create
01:19exit file and we have to press the ip or host it is our ip
01:23This is our port. You can add any port. You can add an IP to your machine.
01:27Linux machine or Parrot OS machine.
01:29If you want it to be outside of the network,
01:31then you can use any port forwarding service. Local to net.
01:34Local to net. If you use the IP, you will have to place it here.
01:38And the port you will have to place it.
01:40After doing this, the output file.
01:43Home directory, user, desktop, test.exe.
01:46We need this file.
01:48After doing this, we will click enter.
01:50Then we will give it a little later.
01:52Тогда we will have to leave it with.
01:54Here, we will get it off in our location.
01:55Here we will leave it.
01:56Here we go.
01:58Here, we will bring it in time.
02:00Positive file.
02:01In our file system, demure and US Secretary.
02:03Dej quaint peu in their desktop.
02:04zone, our test.exe has already been assigned to.
02:05This is how we are our victim.
02:06But then we will send the victim to your local 집sui secret.
02:08That's why we will show up.
02:10You will find this file in the file.
02:12If your left for hacker is required,
02:14who member of the elite one will send you after.
02:16Advance it.
02:17And the individual will angle its back and figure it out.
02:20system GSS hacker to go to the binding of social engineering through here
02:24open this file is opened and now I will send it to my computer
02:27machine here the service is starting to pay load
02:30to pay load set after that we will send it to the victim
02:33first we have what to do here MetaSploid framework
02:36open to the MSF console here I will open it
02:38there is time to go here MetaSploid framework
02:41start after this we will start our multi handler service
02:44so that we can set our payload so here I will
02:47use multi-sla-handler use multi-sla-handler
02:51enter press to do so our multi-sla-handler service
02:54start our payload set which we made
02:57that we will type set payload which we made
03:00Windows meter printer session
03:01Windows meter printer reverse TCP set payload
03:05Windows meter printer slash reverse TCP
03:08enter our payload set our load set
03:10which we have put Lhost and Lport
03:12here we have put Lhost and here we have
03:15command type set Lhost which is our IP
03:18here if you have local to net use
03:20port forwarding here you can add
03:22127.0.0.1 or 0.0.0.0
03:27so that you can add traffic to the public network
03:29traffic to you and the port you have put it
03:31that you have put it here
03:33it's time to run this system
03:44energy as it so
03:54and we can check the drag tree and remove drag tree.
03:57Then we can create another malicious file and create another file in the system.
04:02So, we can hack the Windows and Prodictive system.
04:05This was today's video.
04:06This is the latest video.
04:07Please subscribe to the AJSyberak channel.
Comments