How to do it...

To perform HID attacks follow the given steps:

  1. We can perform them by opening the NetHunter app.
  2. In the menu, we choose HID attacks:
  1. We will see two tabs: PowerSploit and Windows CMD:
  1. Let's try the Windows CMD; in the Edit source box, we can type the command we want to be executed. We can even choose UAC Bypass from the options to make the command run as admin on different versions of Windows:
  1. We choose Windows 10 from ...

Get Kali Linux - An Ethical Hacker's Cookbook now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.