Definition :
Backdoor :
A backdoor is a program allowing to control a system remotely
Payload :
A payload is a program in backdoor which helps in establishing connection
Here’s a photographic example -
Naming of payload :
A payload may consist of mainly 3 sections ie : Platform / Type / Communication direction_Communication Protocol
Platform Ex :
windows, linux, osx, android, apple_ios, pyhton, java, generic
Type Ex :
meterpreter, shell, dillinject, exec, vncinject, messagebox
Communication Direction Ex :
reverse, bind ( direct )
Communication Protocol Ex :
https, tcp, http, udp
Example of simple windows backdoor : windows/meterpreter/reverse_http
Creating a custom backdoor using msfvenom :
for all commands do : msfvenom --help
Step1 : select your payload and see options
Ex : here I created a payload for windows
You get a long list of options so scroll up to normal options and change
Step 2 : Select your options
Scroll Up untill you get this :
Here modify the LHOST with your IP and LPORT with a free port
the command should look like this :
And the backdoor called
backdoor_rev.exe
must be present in your current directory
Listening to Connections through metasploit :
Step 1 : run metasploit module
first type : msfconsole
Then use the multi handler module :
and then run the
show options
command to see all options
You get this setting which is wrong :
Step 2 : correct payload and LHOST
To correct Payload run :
To correct LHOST and LPORT run :
Step 3 : Final check and run
for cross-check run : show options
and see if everything is correct
after everything is correct run :
exploit
and your metasploit will open that port and be checking for connection
Hacking a windows computer :
Step 1 : Moving File to apache2 web server
First open files and var/www/html
and create a new folder called Evil-Files
and move the payload there
Step 2 : Start server
Step 3 : Download backdoor
Go to Kali IP/Evil-Files/
and download the file with security disabled
Step 4 : Execute
If the backdoor is executed successfully then this will appear in your listening connection :