Trending Tutorials

Hacking windows 7/8/8.1/10 using Metasploit Tutorial-By Spirit



So, Hello Guys
I am Spirit as you all know and today we are gonna talk about how we can hack windows 7/8/8.1/10 using shikata_ga_nai encoder
I Hope it will really help you in exploiting 😀
and let me know if i have done any mistake 😀 please

—————————————————————————————–
This tutorial is for educational purpose only i’ll not responsible for any…

40 Comments on Hacking windows 7/8/8.1/10 using Metasploit Tutorial-By Spirit

  1. the payload is complicated. …… it could be much easier

  2. Great Work! (Y)

  3. how to fix this: msf exploit(multi/handler) > msfvenom -h
    [*] exec: msfvenom -h

    C:/metasploit/ruby/lib/ruby/gems/2.3.0/gems/bundler-1.12.5/lib/bundler/spec_set.rb:95:in `block in materialize': Could not find rake-12.3.1 in any of the sources (Bundler::GemNotFound)
    from C:/metasploit/ruby/lib/ruby/gems/2.3.0/gems/bundler-1.12.5/lib/bundler/spec_set.rb:88:in `map!'
    from C:/metasploit/ruby/lib/ruby/gems/2.3.0/gems/bundler-1.12.5/lib/bundler/spec_set.rb:88:in `materialize'
    from C:/metasploit/ruby/lib/ruby/gems/2.3.0/gems/bundler-1.12.5/lib/bundler/definition.rb:140:in `specs'
    from C:/metasploit/ruby/lib/ruby/gems/2.3.0/gems/bundler-1.12.5/lib/bundler/definition.rb:185:in `specs_for'
    from C:/metasploit/ruby/lib/ruby/gems/2.3.0/gems/bundler-1.12.5/lib/bundler/definition.rb:174:in `requested_specs'
    from C:/metasploit/ruby/lib/ruby/gems/2.3.0/gems/bundler-1.12.5/lib/bundler/environment.rb:19:in `requested_specs'
    from C:/metasploit/ruby/lib/ruby/gems/2.3.0/gems/bundler-1.12.5/lib/bundler/runtime.rb:14:in `setup'
    from C:/metasploit/ruby/lib/ruby/gems/2.3.0/gems/bundler-1.12.5/lib/bundler.rb:95:in `setup'
    from C:/metasploit/ruby/lib/ruby/gems/2.3.0/gems/bundler-1.12.5/lib/bundler/setup.rb:19:in `<top (required)>'
    from C:/metasploit-framework/embedded/lib/ruby/site_ruby/2.1.0/rubygems/core_ext/kernel_require.rb:54:in `require'
    from C:/metasploit-framework/embedded/lib/ruby/site_ruby/2.1.0/rubygems/core_ext/kernel_require.rb:54:in `require

  4. how u foking gonna send the exe to the other pc? looool you mental bro

  5. looooool how you can do it loool

  6. this video could be less than 1:30min! why do u not pause it when nothing to show or waiting for command output?!

  7. How to hack PC real ip

  8. fucking stupid lol, RIP english

  9. after the the file is opened on the target computer (my other vm) it says "Meterpreter session 1 opened…" but I don't get the Meterpreter shell to appear. Anyone know what's going on?

  10. This guy almost hacked himself during his attempt to use msfvenom. I don't like generalising but I'm still to see an Indian do quality work. The .exe almost attacked him cringe

  11. RAPID SUPPORT THROUGH PRIVATE CHAT ….Do you need to spy or trace on robbers, retrieve your lost password?database hack? Spy on a friend or partner? Any type of media hack or social Hack :Facebook,Instagram,paypal, twitter,whatsapp,Snapchat?. Credit card hack,spy bugs,Erase Criminal records,School Result Upgrades.Also included are games cheats and hacks.Get the services of a certified hacker, (savvyhackers@gmail.com) he is 100% legit For any form of social media hack,money transfer hack.100% guaranteed and tested

  12. ooooo master excelente funcionaaaa super increible.

  13. LOL @ scriptkiddies…keeping me employed

  14. Ok dude. Uh. This is actually a reverse tcp trojan. Not a…. """""hack""""…. sorry 🙂
    best of luck

  15. Completely wasting time…i would say this is NOT hack, you are just simply connecting the target which has the payload installed….
    Would you say connecting VNC client is kinda of "hack"

  16. You dragged the payload onto target machine you stupid fuck

  17. I have problem when I press exploit …

  18. Everyone saying this wont work, any smart person will know what there getting into if they were to get sent this. You could tecnically hack a whole library and everyone using it with this, just add a simple keylogger and boom your done. Sure this might not be the best way but it works on idiots :/

  19. great job buddy

  20. I love Indians they really always provide valuable information in computer

  21. Stop make video about RAT with metasploit, it's easy to make the same with windows software…

  22. Help! i am waiting "Starting the payload handler" 2 hours to start,its freezed 🙁

  23. Why the fuck do you use virtual machines if your shity pc can't handle it? The tutorial is just fucking lame.

  24. hi what desktop use you? gnome3 no? do you ha ve the download link ? or just apt-get?

  25. thanks, great hacking exercise

  26. HABLA EN ESPAÑOL TONTO CONCHETUAMRE NO TE ENTIENDO NI UNA WEA CONCHETUMAREEEEEE GIL RECULIAO HIJO DE LA MASTURBA BURROS

  27. my lappy is of 64 bit …but whenever i m typing x64 ….its nt working!!but when i typed in x86 it works

  28. This is like 8 years outdated and was bad still in that time 😉

  29. I have a problem with my Kali. I'm using a virtual machine and some characters are wrong. For example "-" is "/" and "=" is ")". How do I change this? It's impossible to type commands because I can't find the right character xD

    A-Z is on their right places, same as 0-9, but all the other characters such as -/()=_&%€# is located on the wrong keys.

  30. English got reaped by indians.

    R.I.P english

    epic tut ever just going to donate my ears………..

  31. can i send it via facebook

  32. Hello, i am a computer forensics student. i need your help on a lot of forensics method… for now i have a question, if i wanna attack a random pc may at starbucks or my some one using my internet… how should i find the ip add of this device or machine. can you please help me with more tutorial which i should learn… thank you

  33. ITS A WORK! TESTED ON A WIN7. EVERYTHING OK!
    root@hijacking byee guys.

  34. how did you manage to connect Kali with windows 7 in virtual box. i have been busting my ass off and still no success, lil help please 🙁

  35. upload "nc" to the victim pc is better,it can do more.(ps:nc? netcat.exe)

  36. bro how to get the victims login password using command in meterpreter session???

  37. ok bro, now working. I think I did'nt use shikata and x86 command
    TQ

Leave a comment

Your email address will not be published.


*