CrazyEngineers
  • Is it possible to hack any system with metasploit only?

    Weed Guy

    Member

    Updated: Oct 27, 2024
    Views: 1.5K

    I am just a script kiddie who request you all to explain what metasploit is and how can i master on it with having some basic stuff about working with pen-test tools.

    0
    Replies
Howdy guest!
Dear guest, you must be logged-in to participate on CrazyEngineers. We would love to have you as a member of our community. Consider creating an account or login.
Replies
  • Kaustubh Katdare

    AdministratorFeb 11, 2019

    Tagging our security expert #-Link-Snipped-# . Sir, could you please help? 

    Are you sure? This action cannot be undone.
    Cancel
  • Amar Oke

    MemberFeb 11, 2019

    In general hackers or crackers aim to install their own payload on the compromised machine. With Metasploit you can do that without having any networking or security knowledge. Simply run a few commands and you will be cracking into remote machines. My friends used it to create APKs that were distributed over file sharing websites. People are so stupid that they download anything that's labelled FREE. Once the user has downloaded the APK you can literally own their phone. I won't go into details; but I know it works because I saw it with my eyes. 

    Just a word of caution though. Be careful to not cause any damage to the client machine. The bigger problem is dealing with police who won't understand the difference between cracking and safe-hacking. 

    Are you sure? This action cannot be undone.
    Cancel
  • Kaustubh Katdare

    AdministratorFeb 12, 2019

    #-Link-Snipped-# - you might have worked on this? 

    Are you sure? This action cannot be undone.
    Cancel
  • Naveen Sunil

    MemberFeb 12, 2019

    I wouldn't say that you can hack into any system with metasploit. But what you can get is atleast a basic connection with the target through vulnerabilities present in the machine. Metasploit can get you a shell in quick time if you have all detailed report about the target system. 

    Now what is hard part in Metasploit is getting your payload to the target successfully. There are numerous ways to do that.

    But just using metasploit you cannot do any miracle. If you have all info about your target then Metasploit makes thing easy for you.

    Are you sure? This action cannot be undone.
    Cancel
  • Amar Oke

    MemberMar 5, 2019

    Thank you, #-Link-Snipped-# . It is difficult to get the access to the root account of the remote system. #-Link-Snipped-# - What's your use case for using it? Try it first on your college network.

    Are you sure? This action cannot be undone.
    Cancel
Home Channels Search Login Register