Documente Academic
Documente Profesional
Documente Cultură
FOLLOW US
Now that nearly everyone and everyplace has a computer, you can use those remote computers for some good old "cloak and dagger" spying. No
longer is spying something that only the CIA, NSA, KGB, and other intelligence agencies can doyou can learn to spy, too.
FreeDownload
HideYourIdentityWithSrchSafe!srchsafe.com
In this brand new series, we will explore how we can use the ubiquity of the computer to peek in on just about anyone and anyplace. Unlike the
spy movies of yesteryear where the spy had to place a listening device in the lamp or in a houseplant, as long as there is a computer in the room,
it can be used as a "bug."
We will examine how to turn that commonplace computer into our own bug to listen in on conversations, use as a spy camera, track Internet
searches, and more. James Bond and Q have nothing on us!
In this first part, I will show you how to convert any computer, anywhere, into a listening device. As nearly every room now has a computer in it,
you can put a bug in nearly every room, unnoticed and undetected.
Step 1
Fire Up Kali
The first step, of course, is to fire up Kali Linux. To be able to use any computer as a bug, the first step will be to compromise the target computer.
https://nullbyte.wonderhowto.com/howto/hacklikeprospyanyonepart1hackingcomputers0156376/ 1/22
6/21/2017 HackLikeaPro:HowtoSpyonAnyone,Part1(HackingComputers)NullByte::WonderHowTo
FOLLOW US
Step 2
Since we know the victim (it may be a girlfriend, neighbor, spouse, business associate, foreign diplomat, foreign spy, etc.), we can can be very
specific in crafting an email that would gain their acceptance. The key, of course, is to create document that sounds compelling, or at least
interesting, to get the victim to click on the Word document.
This becomes an exercise in social engineering at this point. If the victim is a girlfriend/boyfriend, you might try sending a love letter. If the victim
is a business associate, it might be Word or Excel document with a sales or other report. If it is a neighbor, it may be a link to a community
webpage.
I hope you get the point. Be creative and imaginative and send something that the person will be compelled to open and view.
Step 3
Find an Exploit
Now, if we want to exploit a Windows 7 system (most Windows 7 exploits will work on Windows 8), we will need to find a Windows 7 exploit
that utilizes vulnerabilities in Microsoft's Word application.
This past spring, Microsoft revealed that hackers had found a vulnerability in Microsoft Word and Office Web apps that could allow remote code
execution (read, rootkit). Here is Microsoft's announcement on their Technet Security Bulletin below (more info on Technet can be found here).
FreeDownload
https://nullbyte.wonderhowto.com/howto/hacklikeprospyanyonepart1hackingcomputers0156376/ 2/22
6/21/2017 HackLikeaPro:HowtoSpyonAnyone,Part1(HackingComputers)NullByte::WonderHowTo
FreeDownload FOLLOW US
HideYourIdentityWithSrchSafe!srchsafe.com
As you can see, they have named it MS14-017. When we do a search in Metasploit for this vulnerability/exploit, we find:
exploit/windows/fileformat/ms14_017_rtf
Now that we have found the proper exploit, let's load it into Metasploit by typing:
Once we have it loaded, let's type "info" to find more about this exploit.
As you can see, the option we need to fill is the FILENAME. In addition, note that this exploit works only on Office 2010.
Step 4
https://nullbyte.wonderhowto.com/howto/hacklikeprospyanyonepart1hackingcomputers0156376/ 3/22
6/21/2017 HackLikeaPro:HowtoSpyonAnyone,Part1(HackingComputers)NullByte::WonderHowTo
Step 5
Next, set the LHOST. This is the IP of your system. This tells the payload who to call back when it is executed by the victim.
Finally, simply type "exploit." This will create a Word file called "lovepoem" that will place the meterpreter on her system that we can then connect
to.
Step 6
Step 7
WONDERHOWTO GADGET HACKS NEXT REALITY INVISIVERSE DRIVERLESS NULL BYTE
Step 8
Step 9
This will start the microphone on her computer and store the recorded conversations and sounds in a file in the /root directory on your system. Of
course, you can choose any directory to store these recordings. Just make certain you have adequate hard drive space, as these files can become
very large. When you want to hear what was recorded, simply open the stored file on your system.
Related
119 Comments
THELIONKING
2 YEARS AGO - EDITED 2 YEARS AGO -2 HIDDEN
1
HELPER PLAY
https://nullbyte.wonderhowto.com/howto/hacklikeprospyanyonepart1hackingcomputers0156376/ 5/22
6/21/2017 HackLikeaPro:HowtoSpyonAnyone,Part1(HackingComputers)NullByte::WonderHowTo
1
HELPER PLAY
2 YEARS AGO FOLLOW US
Thanks, can I ask something?
Does it make any scent to trace somebody who does it?
if it does, how to cover the trace?
and how to stop the recording sound after enough to spy on?
Thankyou
REPLY
OCCUPYTHEWEB
2 YEARS AGO 1
Helper:
Are you asking me how we can trace the spy? There are many ways that I will address in future forensic posts. As for how to cover a trace, you can use proxies.
Check out my post on use proxychains .
You can set up the sound recorder to only record for a limited amount of time. In addition, once the system is rebooted you will lose the listener. Finally, you can
simply terminate the meterpreter at your end and the recording will end.
OTW
REPLY
ABDUL SHEIKH
1 YEAR AGO -1 HIDDEN
OCCUPYTHEWEB
1 YEAR AGO 1
REPLY
D3V10US/021\PH0X
8 MONTHS AGO 1
REPLY
URATTACKER!
2 YEARS AGO 1
Thanka!
REPLY
OCCUPYTHEWEB
2 YEARS AGO 1
Urattacker:
No, as I have set it up here, the recorder will die when the machine reboots. You will need to set up the meterpreter with persistence to restart on reboot. Check
out my post on persistence.
OTW
REPLY
https://nullbyte.wonderhowto.com/howto/hacklikeprospyanyonepart1hackingcomputers0156376/ 6/22
6/21/2017 HackLikeaPro:HowtoSpyonAnyone,Part1(HackingComputers)NullByte::WonderHowTo
URATTACKER!
2 YEARS AGO 1
REPLY
NEO555
2 YEARS AGO 1
REPLY
CHRIS FRELLIS
2 YEARS AGO 1
REPLY
OCCUPYTHEWEB
2 YEARS AGO 2
Chris:
Metasploit' s multi handler is simply a module that will accept connections from many different payloads.
OTW
REPLY
PRINCEE A
2 YEARS AGO 1
Since you don't know exactly when they will open the file, do you have to keep Kali running as it waits for the payload to execute?
But it is kinda inefficient to keep Kali running for 24 hours while you wait for them to open your email, isn't it?
In that case, is it possible to make the payload continuously attempt to connect to your system, so that when you boot Kali the next day (assuming the victim's
computer is on), it will automatically connect to you?
REPLY
OCCUPYTHEWEB
2 YEARS AGO 1
I don't understand the concept of inefficient? ? You are spying on someone and you are worried about energy consumption???
REPLY
HOSEIN GH
2 YEARS AGO 1
Dear OTW,
I want to ask princess' question in another way, is there any method for running time consuming scripts or waiting for connections in another computer with a
higher speed and memory without the need to buy another computer? can we buy a VPS account from a host provider to do this? I would appreciate if you
answer,since me and princess have some other works to do with our personal laptops besides hacking and meanwhile we don't wanna lose our connection with
victimGADGET
WONDERHOWTO
or stop our script!
HACKS NEXT REALITY INVISIVERSE DRIVERLESS NULL BYTE
https://nullbyte.wonderhowto.com/howto/hacklikeprospyanyonepart1hackingcomputers0156376/ 7/22
6/21/2017 HackLikeaPro:HowtoSpyonAnyone,Part1(HackingComputers)NullByte::WonderHowTo
Thanks in advance for your answer and also for every single of tutorials,you made me see a world I couldn't see before!
FOLLOW US REPLY
DOGACAN EYILIK
2 YEARS AGO 1
i have a question after saying exploit it writes that my file is stored in here /root/.msf4/local/lovepoem.rtf but i cant find it. so how can i send this with email
,while i cant find the document or word file? Or how can i find it?
REPLY
OCCUPYTHEWEB
2 YEARS AGO 1
Dogaca:
The .msf directory is a hidden directory. Move the file to another directory and then attach it to an email.
OTW
REPLY
N8 AWESOME
2 YEARS AGO 1
dear OTW,
i have 2 VMs up, one is kali, and one is the target im using for practice.
how would i like, transfer the listner from VM to VM?
REPLY
OCCUPYTHEWEB
2 YEARS AGO 1
REPLY
OJAS GUPTA
2 YEARS AGO 1
I opened up the file on a different pc to see if this was working but the meterpreter thingy never shows up ?
REPLY
JOKER
2 YEARS AGO 1
First, i am using linux, which LHOST should i use, i have tried 127.0.0.1 and in the "Hack Like a Pro: How to Embed a Backdoor Connection in an Innocent-Looking
PDF" tutorial it binded to the ip, but still after i sent the link to a vulnerable pc it didnt connect.
And how does the payload know how to contact the hackers pc if its in a remote location outside local network and i only provide LHOST?
REPLY
OCCUPYTHEWEB
2 YEARS AGO 1
Joao:
The 127.0.0.1 IP address is only for use internally on your system. You must use the external IP address such as 192.168.1.101.
OTW
REPLY
VITALY SHULGIN
NEXT REALITY INVISIVERSE DRIVERLESS NULL BYTE
2
https://nullbyte.wonderhowto.com/howto/hacklikeprospyanyonepart1hackingcomputers0156376/ 8/22
6/21/2017
VITALY SHULGIN
HackLikeaPro:HowtoSpyonAnyone,Part1(HackingComputers)NullByte::WonderHowTo
2
2 YEARS AGO FOLLOW US
Let him hack the localhost :)
REPLY
JOKER
2 YEARS AGO 1
But i tried to infect a pc on my network and also didnt work. So i have to set my external ip adress right? And the port?
REPLY
OCCUPYTHEWEB
2 YEARS AGO 1
There are many reasons why that may have failed. First and always, make sure you connectivity. If you are on the same network, use the private IP. If outside your
network, use the public IP and port forwarding.
OTW
REPLY
JOKER
2 YEARS AGO 1
REPLY
OCCUPYTHEWEB
2 YEARS AGO 1
Joao:
I don't have a tutorial on it, but I'm sure someone has. Did you try googling it?
OTW
REPLY
JOKER
2 YEARS AGO 1
i did and i spent our trying to configure it, since i am in a linux virtual machine, havent suceeded yet but ill try again tomorrow. thanks ;)
REPLY
CARLOS RIVAS
2 YEARS AGO 1
https://nullbyte.wonderhowto.com/howto/hacklikeprospyanyonepart1hackingcomputers0156376/ 9/22
6/21/2017 HackLikeaPro:HowtoSpyonAnyone,Part1(HackingComputers)NullByte::WonderHowTo
Hello. I am having trouble launching metasploit. It just stays like that for a period of time and kali linux shuts down unexpectedly.
FOLLOW US
REPLY
N8 AWESOME
2 YEARS AGO 1
bro, if you're using the kali OS then go to applications, then go to kali linux, then go to top 10 security tools and the metasploit framework should be there
REPLY
DOGACAN EYILIK
2 YEARS AGO 1
thank you for help, but i got one more question, how do i move the file to another directory? is there a command for it?
REPLY
OCCUPYTHEWEB
2 YEARS AGO 1
REPLY
DOGACAN EYILIK
2 YEARS AGO 1
thanks again but there is a problem (again) i cant attach the file to email cause it says this file has virus it cannot be sent. by the way im using outlook. Do i need
to change to another email? or is there another way?
REPLY
OCCUPYTHEWEB
2 YEARS AGO 1
Dogaca:
Because this attack has been around for awhile, the AV software recognizes it as a virus. You have a couple of options. One, find another way to send the file
(physical or network share or another email system) or two, change the signature of the file. This is a bit more advanced and may not be appropriate for a
beginner.
OTW
REPLY
KIYA
2 YEARS AGO 1
Hi I have done all the parts correctly but at the end when I want to send the file via email, I can't really find where it is stored. I tried
/root/.msf4/local/FILENAME.rtf , it didn't work out.
REPLY
OCCUPYTHEWEB
2 YEARS AGO 1
Kiyar:
OTW
REPLY
WONDERHOWTO GADGET HACKS NEXT REALITY INVISIVERSE DRIVERLESS NULL BYTE
https://nullbyte.wonderhowto.com/howto/hacklikeprospyanyonepart1hackingcomputers0156376/
1 10/22
6/21/2017 HackLikeaPro:HowtoSpyonAnyone,Part1(HackingComputers)NullByte::WonderHowTo
KIYA
2 YEARS AGO FOLLOW US 1
So basically how can I attach the .rtf file by email if it's all hidden. sorry to bother you with my questions.
REPLY
GIREESH PAI
1 YEAR AGO 1
When you are at "Home" press Ctrl+h It will show hidden files and folders.
REPLY
OCCUPYTHEWEB
2 YEARS AGO 1
Simply use the absolute path to the file. Even though the directory is hidden, it can still be acessed.
REPLY
FAIZAN ABRAR
2 YEARS AGO 1
by typing Is -al it only displays the hidden directory, how exactly can I bring it to my home directory? sorry for noobish question
REPLY
OCCUPYTHEWEB
2 YEARS AGO 3
Faizan:
To move any file in Linux, you can use the mv (move) command or the cp (copy) command. You might want to look through my Linux series here.
OTW
REPLY
FAIZAN ABRAR
2 YEARS AGO 1
REPLY
AMEDEO BIANCHI
2 YEARS AGO -1 HIDDEN
HOSEIN GH
2 YEARS AGO 1
Thank you very much for your tutorials,I'm happy I found you and this site! I've gone exactly according to this tutorial,the firewall on victim is off,the
victim(myself on another computer in the local network) ran the file,is using office 2010,with windows 7 Ultimate(no sp installed) but my meterpreter session
doesn't initialize,what am i missing?
REPLY
KIYA
2 YEARS AGO -1 HIDDEN
BRYCE REEDMAN
2 YEARS AGO 1
hey im wanting to know if there some guides about coding, code that exploits and hacks use mostly
https://nullbyte.wonderhowto.com/howto/hacklikeprospyanyonepart1hackingcomputers0156376/ 11/22
6/21/2017 HackLikeaPro:HowtoSpyonAnyone,Part1(HackingComputers)NullByte::WonderHowTo
X-OR45 QWERTY
2 YEARS AGO
FOLLOW US
1
OTW
I have the same HOsein's problem any help please ? my meterpreter session doesn't initialize.
REPLY
LUKE COLLISTER
2 YEARS AGO 1
Hi OTW,
Thanks for all the great tutorials you keep making !
If I were using this to get into a computer on an external network, under LHOST do I enter my public IP or private IP ? And presuming I have port forwarding
setup, would this work on any open port on the external network ? Finally, do I need to set LPORT ?
Thanks,
Luke
REPLY
DANIEL MONAR
2 YEARS AGO 1
hi
i want to see whats she s doing exactly on her pc ..what the page that shs oppening and stuf not only to hear .
ty
REPLY
OCCUPYTHEWEB
2 YEARS AGO 1
Daniel:
I'll be doing more tutorials on the subject very soon, but in the meantime check out some of my other Metasploit tutorials here in Null Byte and check out thislist
of scripts you can run from Metasploit.
OTW
REPLY
DEJAN PERIC
2 YEARS AGO 1
Now i am pretty happy to go on exploring ahead using meterpreter i am just wondering, did you ever make a tutorial, or is there anywhere i can read about
making something like a listener, but that starts up when the windows starts up. For example i manage to get the listener to the target once, and then even if the
target shuts down his computer, the next time he starts it up i can connect up on the existing listener :) ?
REPLY
OCCUPYTHEWEB
2 YEARS AGO 2
Dejan:
Check out this article on making the listener persistent. In this way, whenever the victim reboots, the listener will reconnect to your computer.
OTW
REPLY
DEJAN PERIC
2 YEARS AGO 1
https://nullbyte.wonderhowto.com/howto/hacklikeprospyanyonepart1hackingcomputers0156376/ 12/22
6/21/2017 HackLikeaPro:HowtoSpyonAnyone,Part1(HackingComputers)NullByte::WonderHowTo
REPLY
FOLLOW US
JOHN KON
2 YEARS AGO 1
REPLY
OCCUPYTHEWEB
2 YEARS AGO 1
John:
I'm not sure I understand your question. Can you elaborate please?
OTW
REPLY
GHOSTSQUAD1
2 YEARS AGO 1
Can we put data into the actual word file, so it's not so suspicious when it's opened
REPLY
OCCUPYTHEWEB
2 YEARS AGO 1
Yes, of course.
REPLY
GHOSTSQUAD1
2 YEARS AGO 1
Thanks man,
One more question how do we move the file into another directory so we can see it?
REPLY
OCCUPYTHEWEB
2 YEARS AGO 1
REPLY
GHOSTSQUAD1
2 YEARS AGO 1
REPLY
GHOSTSQUAD1
2 YEARS AGO 1
I figured out how to find and open the file, how do we add content to it? when I open it, it is just lots of line of code
REPLY
SYMBASNAKE
2 YEARS AGO -2 HIDDEN
MATTHEW YERICH
https://nullbyte.wonderhowto.com/howto/hacklikeprospyanyonepart1hackingcomputers0156376/ 1
13/22
6/21/2017 HackLikeaPro:HowtoSpyonAnyone,Part1(HackingComputers)NullByte::WonderHowTo
MATTHEW YERICH
2 YEARS AGO FOLLOW US 1
Hi OTW,
I followed your instructions and generated the rtf file with the payload. When I add it to a Gmail as an attachment, Gmail exclaims that it is a virus and does not
allow it to be sent. Is there anyway around this? Also, is there a way to save the file as a .doc or .docx so it looks like a real word file?
Thanks,
Matthew
REPLY
ALLIE HANICHAK
2 YEARS AGO 1
REPLY
OCCUPYTHEWEB
2 YEARS AGO 1
Which file?
REPLY
NETWOLF
2 YEARS AGO 1
Hello OTW,
Im having a problem. When I try to exploit it says "starting the payload handler". But then it's stuck. Im pretty sure that i've done all the commands correctly.
Maybe it's due to running kali on a vm, idk..
REPLY
OCCUPYTHEWEB
2 YEARS AGO 1
REPLY
NETWOLF
2 YEARS AGO 1
REPLY
OCCUPYTHEWEB
2 YEARS AGO 1
REPLY
NETWOLF
2 YEARS AGO 1
REPLY
OCCUPYTHEWEB
2 YEARS AGO 1
Can youGADGET
WONDERHOWTO pingHACKS
the victim?
NEXT REALITY INVISIVERSE DRIVERLESS NULL BYTE
https://nullbyte.wonderhowto.com/howto/hacklikeprospyanyonepart1hackingcomputers0156376/ 14/22
6/21/2017 HackLikeaPro:HowtoSpyonAnyone,Part1(HackingComputers)NullByte::WonderHowTo
REPLY
FOLLOW US
NETWOLF
2 YEARS AGO 1
REPLY
IYIK BE
2 YEARS AGO 1
OTW, what is the start port and end port should i used in port forwarding ?, thanks
REPLY
SINGLE ZERO
1 YEAR AGO - EDITED 1 YEAR AGO 1
REPLY
DILL _
1 YEAR AGO - EDITED 1 YEAR AGO 1
What kind of file are you making? Your above command creates an executable file with a meterpreter backdoor.
REPLY
SINGLE ZERO
1 YEAR AGO - EDITED 1 YEAR AGO 1
https://nullbyte.wonderhowto.com/howto/hacklikeprospyanyonepart1hackingcomputers0156376/ 15/22
6/21/2017 HackLikeaPro:HowtoSpyonAnyone,Part1(HackingComputers)NullByte::WonderHowTo
SINGLE ZERO
1 YEAR AGO 1
REPLY
DILL _
1 YEAR AGO 1
Has the patch been installed on the box? OTW posted a link in the article giving the details on the patch.
REPLY
ME MAISELF
1 YEAR AGO 1
after the victim has opened the msword document with the embedded metasploit things. is there any message that i will recieve, just like the way RATs notefy you
of any new connection, so that i can tell that the server has been been installed in the victims device? or what next?
REPLY
OCCUPYTHEWEB
1 YEAR AGO 1
You will get the meterpreter prompt on your computer like in the tutorial.
REPLY
CRACKER|HACKER
1 YEAR AGO - EDITED 1 YEAR AGO 1
You can also make a small script to make a beeping noise if it detects you have a Meterpreter prompt, if you want that much.
REPLY
_URBZ_
1 YEAR AGO 1
1) sending an rtf file would be suspicious. I don't more than 10% of users would even associate that file extension with MO.
2) It requires MO 2010, which is less of a problem because people tend to update infrequently.
REPLY
REPLY
Also, using Veil-Evasion I changed the signature of a known exploit (rev-tcp) as suggested in one of your tutorials. Can I just simply load this custom payload into
any exploit? I rekon that if its possible, I must have the custom payload in the payload directories, right?
Thanks in advance!
REPLY
_URBZ_
WONDERHOWTO 1 YEAR AGO
GADGET HACKS NEXT REALITY INVISIVERSE DRIVERLESS NULL BYTE 2
https://nullbyte.wonderhowto.com/howto/hacklikeprospyanyonepart1hackingcomputers0156376/ 16/22
6/21/2017 HackLikeaPro:HowtoSpyonAnyone,Part1(HackingComputers)NullByte::WonderHowTo
Yes. He actually released a tutorial for this about a month ago right Here FOLLOW US
REPLY
REPLY
THOMAS BURGESS
1 YEAR AGO 1
How do you do this on Mac? If I'm not mistaken, this only works on windows...
REPLY
OCCUPYTHEWEB
1 YEAR AGO 1
REPLY
JACKY MARROW
1 YEAR AGO 1
Hey,
Wanted to ask which tcp port does the reverse tcp tunnel uses in order to connect me to the victim's machine?
Much Regards
REPLY
ZORDON
1 YEAR AGO 1
REPLY
OCCUPYTHEWEB
1 YEAR AGO 1
You need to use the target and your public IP's and port forward through your router.
REPLY
MARC CUMMINGS
1 YEAR AGO 1
REPLY
BLUE CHARLES
1 YEAR AGO 1
OTW, is anyway I can use to turn on the computer when it's powered off by using meterpreter or other ways?
REPLY
BENTIEBOY
1 YEAR AGO 2
https://nullbyte.wonderhowto.com/howto/hacklikeprospyanyonepart1hackingcomputers0156376/ 17/22
6/21/2017 HackLikeaPro:HowtoSpyonAnyone,Part1(HackingComputers)NullByte::WonderHowTo
Hi OTW
Im new at hacking and did everything you said
FOLLOW US
But i cant execute the "use exploid/multi/handler"
What would it be?
REPLY
OCCUPYTHEWEB
1 YEAR AGO 2
It hard to say from what little info you gave me, but if you spelled the way you did here, it's typo. Check your spelling.
REPLY
BENTIEBOY
1 YEAR AGO 1
hey sorry maybe another noob question but can you give somemore detail on how to move the file cause it seems i cant do it?
thanx in advance
REPLY
BENTIEBOY
1 YEAR AGO 1
REPLY
LEONIDAS DECIMUS
1 YEAR AGO 1
Sorry to hijack this topic mr occupytheweb...but maybe someday you can do post focused on how things is exploit..for example...
Inside this topic you mention about ms14 - 017 exploit...maybe you can explain how the creator of this exploit do it...I mean in a really technical detail...
REPLY
just want to ask, Is this legit? I'm sorry if I ask that. I just want to be sure that this is not scam. Thank you. :)
REPLY
BENTIEBOY
1 YEAR AGO 1
REPLY
I'm curious as to how to find my file when I create it as it does not pop up in my root folder
REPLY
OCCUPYTHEWEB
1 YEAR AGO 1
REPLY
WONDERHOWTO
HEWYS WALKER JACKS
1 YEAR AGO
GADGET HACKS NEXT REALITY INVISIVERSE DRIVERLESS NULL BYTE
1
https://nullbyte.wonderhowto.com/howto/hacklikeprospyanyonepart1hackingcomputers0156376/ 18/22
6/21/2017 HackLikeaPro:HowtoSpyonAnyone,Part1(HackingComputers)NullByte::WonderHowTo
Thanks for your fast reply! And I'll just send you an attachment with my problem.
FOLLOW US
I cannot find my file. I've also tried going through your basics. As seen in the next two images.
REPLY
OCCUPYTHEWEB
1 YEAR AGO 1
It tells you in the second screenshot that your file is in .//msf5/local/Resume.rtf. You need to use that path in your exploit.
REPLY
Thanks again but how exactly do I use the path?, I tried finding the folder where the file is located, but had no luck. Sorry for asking so much.
REPLY
OCCUPYTHEWEB
1 YEAR AGO 1
When you use Metasploit simply use the full path to that document.
REPLY
https://nullbyte.wonderhowto.com/howto/hacklikeprospyanyonepart1hackingcomputers0156376/ 19/22
6/21/2017
HEWYS WALKER JACKS
HackLikeaPro:HowtoSpyonAnyone,Part1(HackingComputers)NullByte::WonderHowTo
1
1 YEAR AGO - EDITED 1 YEAR AGO FOLLOW US
Oh seriously? Thanks, how would I go about sending the file tho? And I mean I can't find the directory it gave me.
Also when I search for the file on my computer I only get these, In which I don't think any of them are the file as they do not have ".rtf" after the name "Resume"
(Filename of my choice)
REPLY
OCCUPYTHEWEB
1 YEAR AGO 1
The directory you put it in, /.msf5 is a hidden directory. Move to your desktop and use it from there.
REPLY
Thanks again, Yeah I was able to transfer the file from the hidden folder to my documents! :D
REPLY
hi i did all the instuctions , my friend did open that file but the meterpreter did not show up o.O what shall i do , help me plz
REPLY
ALBERKKO
8 MONTHS AGO 1
REPLY
BLACK EAGLE
8 MONTHS AGO 1
i am sure that i followed all the steps perfectly but the meterpreter prompt wont appear
REPLY
MUNEEB SHAHID
7 MONTHS AGO 1
hello
may i know how to hack a pc with its ip address because i can not send him a mail but i know his pc ip address
REPLY
ARCANIUM QUINN
4 MONTHS AGO 1
https://nullbyte.wonderhowto.com/howto/hacklikeprospyanyonepart1hackingcomputers0156376/ 20/22
6/21/2017 HackLikeaPro:HowtoSpyonAnyone,Part1(HackingComputers)NullByte::WonderHowTo
Hello! I am new to metasploit. I am using Armitage because I couldn't find normal metasploit on the desktop. Anyway, it says that theres aFOLLOW
INFILENAME. I already defined it. Help?
problem
US with
REPLY
KYLIE LOVE
4 MONTHS AGO -1 HIDDEN
PERFECT STORM
3 MONTHS AGO 1
REPLY
PERFECT STORM
3 MONTHS AGO 1
REPLY
AASHU MALGURI
5 DAYS AGO 1
chief ,here I use my public iddress as LHOST as the victim is not in my LAN network but i didn't get the meterpreter console when he opened the rtf file???
pl help
REPLY
YOU
LOGIN TO COMMENT
https://nullbyte.wonderhowto.com/howto/hacklikeprospyanyonepart1hackingcomputers0156376/ 21/22
6/21/2017 HackLikeaPro:HowtoSpyonAnyone,Part1(HackingComputers)NullByte::WonderHowTo
FOLLOW US
HOT LATEST
HOW TO
https://nullbyte.wonderhowto.com/howto/hacklikeprospyanyonepart1hackingcomputers0156376/ 22/22