Rating is available when the video has been rented.
This feature is not available right now. Please try again later.
Published on Mar 7, 2012
Today we will be automating persistent backdoors on our target using metasploit framework. Lot's of fun! :D
In an earlier video, we have seen how to craft an undetectable backdoor using the metasploit framework tools. Today, we are going to automate the process of sending such a backdoor to our victim(s) so that our handler works much like a RAT (remote administration tool) and accepts reverse https connections simulteaniously.
This video was produced in experimental laboratories under controlled circumstances; You can use these techniques only where you are authorized to do so legally. The author and/or contributors will not take responsibility for the viewer's actions.