OK, so let's see how we can gain full control and get an interpreter session from the target computer.
So again, we're going to go on the commands and we're going to go into social engineering.
Now, there's actually a number of ways that you can use in here to get a reverse shell.
Now, it all depends on how you want to make your social engineering attack.
What we're going to use, we're going to use a notification bar, a fake notification bar, and we're
choosing Firefox because our target is runs on Firefox or are using Firefox.
So what this will do, it will basically tell the user it will display a notification by telling the
user that there is a new update or there is a plug in that you need to install.
Once they install the plug in, then they'll actually install a back door and you'll gain full access
to their computer.
So the way we're going to do this is we're going to use the same back door that we always created and
we've been using.
Now, I actually have it stored in my Web server, so I have it stored and var.
W w w Mel and I have it called off the statistics, but it's the same Back-Door, the same reverse CETP
interpretor that we used before.
So I'm going to give the full address to it here, so it's stored in.
Ten, twenty, fourteen to seven.
That's my actual IP and the name of the file is updated to.
And then denazification denazification is just saying there is an additional plugin that needs to be
installed to display some elements on this page.
Now, you can change this and just say a critical update for Firefox.
Click here to install.
So I'm going to execute.
And if we go into Target, you can see that they're getting a message telling them that there is a new
update for Firefox and click here to download and install.
So the targeted person will be like, oh, you need to install this.
So they downloaded.
And now basically they have a backdoor downloaded on their machine once they try to run this back door
to install the update, they think it's an update, but they'll actually run a backdoor, which will
give us full access to their computer.
Before I run the backdoor, I need to listen on the part exactly like we did before.
So I'm just going to do so options here to show you I'm not going to go through all the steps.
It's using meters, multi harder, same way we did it in the video of this nick for parts.
So we're using meter battery versus GTP.
I have my IP and the port, so I'm just going to do exploit.
And I'm listening for the connections now.
Now let's run the update that we just downloaded.
And if we go into the target, you can see that we got full control over it using M Peter session.
Now, again, this is just an example of one way of gaining full control over the target computer.
There is a number of ways that you can do using beef and there is a number of social engineering attacks
that you can do to gain full access on the target computer.
So, again, I highly recommend you go over the plug ins and experiment with them and see what attacks
you can come up with.