

Or, it could simply be something as innocent-sounding as watching a hilarious cat video. We've all seen those spam emails that claim to help us acquire a small fortune by working at home, grow our penises to proportions that would make a stallion envious, and apply for millions of dollars in unclaimed bank funds. One way or another, we need to induce the victim to click on our link. This is the social engineering part of this hack. Our job now is to get the victim to click on the link. You will be greeted by a screen like this.Īs you can see where I have highlighted in the above screenshot, Metasploit has generated the exploit and then started a server to host the exploit. You can do that by using the menu system in BackTrack, or more simply, typing: In this installment, we'll be sending a malicious link thanks to a vulnerability in the handling of Windows Shortcut files. We will focus on attacking those vulnerabilities in the browser and the apps on Windows 7 in order to gain access and own those systems in the following " How to Hack Windows 7" series of tutorials. Fortunately, for the hacker, the same cannot be said for their browser, Office Suite, and other apps, as well as all of the third-party applications that reside on the typical client system and, sometimes-on the server.

Attacking their operating systems has become increasingly difficult.

Microsoft finally got the message that they need to make their operating systems more secure and they have done so. I already have a tutorial on sending a malicious link that can be used against Internet Explorer 8 on Windows XP, Vista, Server 2003, Server 2008 and Windows 7, and another on how to crash Windows 7 by creating an infinite loop. After the disaster that was Windows Vista and the limited and reluctant adoption of Windows 8 and 8.1, Windows 7 has become the de facto standard operating system on the desktop/client.Īlthough the most valuable information to the hacker resides on servers, sometimes the best way to get to a fortified server is through a vulnerable client on the same network with inexperienced and gullible users and numerous insecure applications.īeginning with this tutorial, I will be showing you numerous ways to attack and exploit Windows 7.
