NetHunter has several built-in tools that allow you to configure an HID attack. In one of these tools, NetHunter leverages the standard command line to perform several commands in succession. To access the HID attack menu, click on NetHunter and then HID Attacks. Once on the HID Attacks screen, we will see two options. One is a PowerSploit attack and the second is the Windows CMD attack. For this section, we will look at the Windows CMD attack in detail.
In this scenario, we are going to use the NetHunter platform and connect it to a target machine. Our attack will leverage the HID vulnerability to run the ipconfig command and add a user, offsec, to the system using the net user offsec NetHunter! / add command .
Finally, we will ...