Open Metasploit on Kali by typing msfconsole in a terminal.Part 4 is setting up your listener using Armitage. Part 3 is using both in Shellter to create your undetectable Trojan. The second part is creating the Executable file. The first part is creating the DNS Payload. I have taken a few guides/tutorials and built it into one. In this tutorial I am going to show you how to create an undetectable Meterpreter Trojan using a Domain name.
0 Comments
Leave a Reply. |
Details
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |