Reverse Shell with Meterpreter & Metasploit - Kali Linux Tutorial

preview_player
Показать описание
In this beginner tutorial, you will learn the basics of creating a reverse shell using Setoolkit, Meterpreter, and Metasploit on Kali Linux. At the end of the tutorial, I will show you the principles and techniques hackers use to carry out ransomware attacks.

A reverse shell is a technique used for controlling a computer using a connection initiated by the user. The principles are 1) creating a payload, 2) uploading to an external source, 3) deceiving the user via social engineering, and 4) creating a shell.

Ethical hackers and pentesters can use this technique to test systems and users when simulating attacks.

BONUS: In this tutorial, I also show you how to start the Apache2 Web Server to upload the payload locally as well as the principles of ransomware by using the CatCash ransomware simulating tool.

### CHAPTERS ###
00:00 👉🏻 Intro
00:50 👉🏻 Recon
01:54 👉🏻 SEToolkit
02:56 👉🏻 Apache
05:28 👉🏻 Metasploit
06:03 👉🏻 Meterpreter Shell
07:48 👉🏻 Ransomeware Simulator
11:10 👉🏻 Conclusion

### LINKS ###

🤓 Follow Me:

#METERPRETER #METASPLOIT #TUTORIAL
Рекомендации по теме
Комментарии
Автор

WOW 😲, I'm Bernard right from Nigeria, I'm happy to follow and enjoy this very amazing tutorial so far.. keep it up brother, I love you 😘

maraelisa
Автор

another amazing video! soon I will become an ethical hacker thanks to you!

diegomccastrillon
Автор

quick note: when running nmap with superuser priviledges, stealth scan (-sS) is the default scan, no need to mention it explicitly

rolandcucicea
Автор

sir, on around 6 mins the domain for the download link runs on the attacker but when I tried to open up the download link on the windows it doesnt load

i run it on kali linux then open up on my windowsit only let me access on the kali linux but on other device it wont why?

mansweepquo
Автор

coool love it, i will try it right now

southsidegarage
Автор

Please I have some questions about this tutorial..
Firstly(¹), how do you figure or setup out 4444 as your port and secondly(²), does the payload or shell which has been malicious installed, have something like time or limited to disconnect from the victim system or does it remain active anytime

maraelisa
Автор

Great video! Thanks! Can you tell how do you know the Apache IP (10.211.55.4)? Did you set it somewhere ? Thanks

raybang
Автор

Hi GetCyber, why it’s doesn’t works on Ubuntu? i install mestasploit on ubuntu, then i create a listener but not meterpreter session. Works fine on kali linux. Thanks for your answer.

axellonda
Автор

2:46 sec inter port 4444, how i find my port ? or i use same 4444 please guide me im big fan for you

blenderd
Автор

is it possible using a rasberry pi pico to grab files from a victims pc and send them to your own pc?

kiska
Автор

Can I know what is this vulnerability CVE number?

yoshida
Автор

Hey having trouble on windows vm when putting in ip I don’t get the Apache 2 I get can’t reach this page took too long to respond everything works on kali vm apache2 works any ideas what to do?

franklinclinton
Автор

Hey bro I'm having some trouble with and assignment is there anyway you could reach out to me and give me some help please

thatniqqakevin
Автор

Antivirus and ms defender left the chat👽

callduty
Автор

4:30 this part doesnt work for me, also 6:12

StreamMovieYT
Автор

I cant go on this website on a other computer, is this bec Its a local Ip???

BramBaas