How to do it...

To perform HID attacks, follow these steps:

  1. We can perform HID attacks by opening the NetHunter app.
  2. In the menu, we choose HID Attacks:
  1. We will then see two tabs the PowerSploit tab and the Windows CMD tab:
  1. Let's try the Windows CMD tab; in the Edit source box, we can type the command that we want to be executed. We can even choose UAC Bypass from the options to make the command run as admin on different versions of Windows:
  1. We choose Windows 10 from the UAC Bypass menu, and then we type a simple command as shown ...

Get Kali Linux - An Ethical Hacker's Cookbook - Second Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.