brickopk.blogg.se

Macbook air kali linux
Macbook air kali linux










Export and edit the pdf – in order to make the image more convincing, we will edit the image we will use in GIMP.Install GIMP, a photo editor – we are going to disguise our trojan file as a pdf, and so we need a picture for the file to display.After all, a pdf that opens nothing is very suspicious. When the victim opens our fake pdf, we want to download and display the image that they think they will see. Create a python web server – we want to create a web server that our applescript can use to download files.This can be done easily by emailing the file to yourself (don’t worry, you won’t hack yourself if you send it via text file) Save the trojan to a file – after we generate the script, we will need to transfer it to our mac.Once we input the hacker’s IP address, listening port, and payload to use, Empire will generate an applescript that we can export as an application that will start up a session.

macbook air kali linux

  • Create the stager – using Empire, we will create the stager, the module that generates the custom applescript.
  • macbook air kali linux macbook air kali linux

  • Create the listener – using Empire, we will input and IP address and port as parameters, as well as the type of listener.
  • Install the listening tool – we will be using Empire to generate an applescript payload and listen for the signal to start the session.
  • Note: If you do not have Kali Linux, you can buy a pre-made ready to boot USB with Kali Linux on it from our shop or you can buy Kali Linux on Amazon.












    Macbook air kali linux