Compromise Remote Access Protocols

Let us discuss about how we can compromise remote access protocols. There was a time when applications that bypass system protocols to provide remote access were famous. Those applications are presently being replaced with online services like GoToMyPC or LogMeIn, they are still quite common. Examples of such programs include pcAnywhere and VNC. We should note that instances of these applications/tools may be present on the network due to the legitimate actions of a system administrator. Although, they may also be present because the network has been compromised and the attacker wanted a channel to remotely access the network. Securing communication during attack is also a skill you can learn one of them from here

Now we'll compromise remote access protocols (VNC) using the built-in functionality of the Metasploit framework:
1. You need to Locate the remote access software on the target using nmap. following screenshot shows the process, VNC is usually found on TCP port 5900:

2. Now you need to activate the Metasploit framework using the msfconsole command from a Terminal window. From the msfprompt, configure it to compromise VNC, following screenshot explains this:

3. Now time to initiate the run command, as shown in the following screenshot, and watch for a successful run:

4. In the end, once Metasploit has determined the credentials, validate them by logging in to the VNC client using vncviewer. From the Command Prompt in a Terminal window, enter the following:
root@kali:~# vncviewer <Target IP>

Now after entering the above this will connect to the remote host and prompt you to enter the appropriate credentials. When the authentication is successful, a new window will be opened, giving you remote access to the target system. Verify that you are on the target system by issuing the whoami query, as shown in the following screenshot, and request the system's ID or IP address:

That's it. Thanks for reading. you should also learn about how to prevent penetration attacks using Metasploit also and its methodologies.




AC Milan,26,Arsenal,33,Atalanta,31,Atletico Madrid,33,Barcelona,44,Bayern München,27,Bundesliga,98,Business,1,Chelsea,42,Copa America,4,Coronavirus,2,Cristiano Ronaldo,32,Dortmund,23,Ethical Hacking,46,Euro 2020,16,Exploitation,35,FA Cup,2,Featured,958,Football,971,Footprinting,29,Google Adsense,2,Inter Milan,26,Juventus,44,Kali Linux,39,Kali NetHunter,3,LaLiga,163,Lazio,26,Leicester City,23,Ligue 1,95,Liverpool,45,Lyon,11,Make Money,3,Manchester City,55,Manchester United,49,Messi,21,Metasploit,1,Napoli,18,Offensive Security,17,Penetration Testing,15,Politics,2,Post Exploitation,19,Premier League,256,PSG,25,Real Madrid,47,Roma,12,Search Engine Optimization,4,Serie A,137,Sevilla,19,Sports,942,Technology,36,Tips,16,Tottenham Hotspur,33,Trending,1186,UEFA Champions League,126,UEFA Europa League,18,UEFA Nations League,6,United States,1,Windows,7,World Cup,3,World News,7,
My Hack Stuff: Compromise Remote Access Protocols
Compromise Remote Access Protocols
My Hack Stuff
Loaded All Posts Not found any posts VIEW ALL Readmore Reply Cancel reply Delete By Home PAGES POSTS View All RECOMMENDED FOR YOU LABEL ARCHIVE SEARCH ALL POSTS Not found any post match with your request Back Home Sunday Monday Tuesday Wednesday Thursday Friday Saturday Sun Mon Tue Wed Thu Fri Sat January February March April May June July August September October November December Jan Feb Mar Apr May Jun Jul Aug Sep Oct Nov Dec just now 1 minute ago $$1$$ minutes ago 1 hour ago $$1$$ hours ago Yesterday $$1$$ days ago $$1$$ weeks ago more than 5 weeks ago Followers Follow THIS PREMIUM CONTENT IS LOCKED STEP 1: Share to a social network STEP 2: Click the link on your social network Copy All Code Select All Code All codes were copied to your clipboard Can not copy the codes / texts, please press [CTRL]+[C] (or CMD+C with Mac) to copy Table of Content