How to setup a C&C server with Metasploit like a Hacker!

How to setup a C&C server with Metasploit like a Hacker!

Tech Raj

6 месяцев назад

8,080 Просмотров

In this video, I demonstrate how to setup a Command and Control (C&C) Server with Metasploit on Kasm workspaces.
Kasm is a container streaming platform that lets you run docker containers and stream them directly from your web browser. We first install Kali Linux inside Kasm Workspaces, setup tunneling with ngrok and then use Metasploit as a C&C server.
All the commands used in this video can be found in my blog post: https://www.blog.techraj156.com/post/setting-up-a-c-c-server-with-metasploit-and-kasm-workspaces
Metasploit: https://www.metasploit.com/
Kasm Workspaces: https://kasmweb.com/docs/latest/index.html

DISCLAIMER: This video is intended only for educational purposes.
The experiments in this video are performed in a controlled
lab setup and not on a live target. The content is purely
from a penetration testing perspective. I do not
condone or encourage any illegal activities.

Join my Discord: https://discord.gg/6TjBzgt
Follow me on Instagram: https://instagram.com/teja.techraj
Website: https://techraj156.com​​​​​
Blog: https://blog.techraj156.com

Thanks for watching!
SUBSCRIBE for more videos!

Тэги:

#metasploit #kali_linux #reverse_shell #c&c #command_and_control #tech_raj #rce #ethical_hacking #penetration_testing #msfvenom #payload
Ссылки и html тэги не поддерживаются


Комментарии: