CSI3508 - Ethical Hacking: Windows Exploit with Kali Linux Metasploit
VerifiedAdded on 2023/06/04
|4
|822
|71
Report
AI Summary
This report outlines the development of an exploit targeting Windows operating systems using the Metasploit framework within a Kali Linux environment. The goal is to gain unauthorized access to a victim's Windows machine without physical access. Metasploit, a penetration testing tool, is used to create and execute exploit code against the target. The process involves setting up the Kali Linux environment with the necessary tools, identifying the target Windows machine's IP address and port, creating an executable file using Msfconsole, and sending this file to the victim. Once the victim opens the file, the attacker gains control through the meterpreter option, enabling activities such as file manipulation, directory changes, and even remote shutdown. The report details the commands used, the process of setting up the exploit, and the potential impact on the victim's system.
1 out of 4







