Book Image

Mastering Metasploit

By : Nipun Jaswal
Book Image

Mastering Metasploit

By: Nipun Jaswal

Overview of this book

Table of Contents (17 chapters)
Mastering Metasploit
Credits
About the Author
About the Reviewers
www.PacktPub.com
Preface
Index

Attacking on the client side with Armitage


Client-side attacks require the victim to make a move as we have seen many times in the past few chapters. We will attack the second host in the network that is running on a Windows 7 system. In this attack, we will create a simple payload, send it to the victim, and wait for the victim to open our payload file by setting up a listener for the incoming connection. We are much more familiar with this attack as we have conducted this attack so many times before in the previous chapters by using Metasploit, SET, and so on. In the following discussion, we will see that what actual difference is there when we create a payload using GUI rather than using command line.

Therefore, let's see how we can create a payload and a listener by performing the following steps:

  1. Search for a payload or browse the hierarchy to find the payload that we want to use. In the context of our current scenario, we will use the meterpreter reverse_tcp payload as follows:

  2. In order...