O'Reilly logo

BackTrack 5 Cookbook by David De Smet, Willie Pritchett

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Collecting victims' data

In this recipe, we will explore how to collect data from a victim by using Metasploit. There are several ways to accomplish this task, but we will explore recording a user's keystrokes on the compromised machine. Collecting a victim's data allows us to potentially gain additional information that we can use for further exploits. For our example, we will collect keystrokes entered by a user on a compromised host.

Getting ready

The following requirements need to be fulfilled:

  • A connection to the Internet or intranet is required to complete this recipe
  • A compromised machine using the Metasploit Framework is also required

How to do it...

Let's begin the process of collecting data from a victim from a Meterpreter shell. You will ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required