So I am part of the team where in we have to conduct a penetration testing assignment for our client. Basically what he wants from us is to show how we can get into their system with the help of phishing, and for the POC he wants us to show the listener which we set up.
- My understanding here is to create an exploit with metasploit -> set up the listener -> send the exploit to users -> make them click the attachment = Boom, we get the shell.
Idea wise this is correct but I am stuck at the execution.
- How do I encode my exploit so that I doesn’t get detected by the AV. here I have tried the obvious .exe approach which gets detected and deleted immediately. similarly I tried binding it with a pdf which also got detected by the AV.
- Secondly I am using dynamic IP. In-order to to get it working I tried no-ip which has changed to now-dns and created a host name against my ip. I am not clear to what do I do next, I entered the host name in the listener ip, but how will I get the shell or the listener.
- Suggestions for the ideal exploit in this scenario – are there any other approaches that I can consider in this case which could help in getting the desired result.
Feel free to correct me if I am wrong at anyplace. I am new in this area so could have missed few things.
Continue reading Penetration testing of windows ( Corporate systems )→