Once the file developed using Msvenom is successfully executed into the victim’s computer then the following attacks can be performed by the attacker- in this case, Kali Linux 2020.
At first, we need to setup the Msvenom to the listening device in order to establish a connection between the victim’s computer (Windows 7) and then begin to perform different kinds of attacks which can range from minor to fatal damage to the victim.
Open the Metasploit framework and then execute the following command in the Msvenom labeled as msf5.
Once this is command is executed successfully in the Metasploit framework then you have established a successful connection between your device and with victim. Meterpreter is an advanced, dynamically extensible payload that uses in-memory DLL injection stagers and is extended over the network at runtime. It communicates over the stager socket and provides a comprehensive client-side Ruby API. It features command history, tab completion, channels, and more. We can execute various commands and their different results based on the command which the attacker has executed in the meterpreter. Here, are some of the commands to access the useful information of the victim’s devices.
netstat- This command displays information about all the network information of the victim’s pc.
route- This command displays the routing information of the victim’s pc.
sysinfo- This command displays the information about the victim’s system.
ownload /windows/System32/config
- This command downloads SAM file of the victim’s computer.