Chapter 6
Exploiting a Client-side Target
Section 4
Exploiting Windows 7
Normal 0 false false false EN-US X-NONE X-NONE /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-parent:""; mso-padding-alt:0in 5.4pt 0in 5.4pt; mso-para-margin-top:0in; mso-para-margin-right:0in; mso-para-margin-bottom:10.0pt; mso-para-margin-left:0in; line-height:115%; mso-pagination:widow-orphan; font-size:11.0pt; font-family:"Calibri","sans-serif"; mso-ascii-font-family:Calibri; mso-ascii-theme-font:minor-latin; mso-hansi-font-family:Calibri; mso-hansi-theme-font:minor-latin; mso-bidi-font-family:"Times New Roman"; mso-bidi-theme-font:minor-bidi;} Most business and home users still use Windows XP and 7. What they don't know could potentially leave them at risk in a compromised system and accounts. - Open the terminal, navigate to /pentest/exploits/set, and launch set using ./set - Select appropriate options from the toolkit meny, input the IP address, then select options to start a payload handler - Copy msf.exe to /var/www, download msf.exe using Apache, and execute msf.exe