As human beings, we don’t like the same flavor every day. If we talk about Ethical Hacking, a maximum of tools work on command lines. It’s a fun thing but sometimes it becomes boring when we have to repeat the same command lines over and over again.
Setting Up Kage in Kali Linux
chmod +x Kage.0.1.1-beta_linux.AppImage
./Kage.0.1.1-beta_linux.AppImage
It will start the GUI. In the login screen, you will see a power button. Click on that and it will connect it to the Metasploit Database. After reaching the progress bar to the ‘Done’ click on cancel and login to the Dashboard.
In the Dashboard select the payload type, put the Lhost and Lport, payload name and click on create. The session is started successfully.
In the next “Payload Generator“ option set the payload name, host and port. If you want to work it over WAN set the static IP address and any unused forwarded port. Now choose the extension of the payload. Here we want to work it on Windows, that is why we are selecting the .exe format. And now click on ‘Generate‘.
This will take some time. Stay with patience. The payload will be created at the Path- /root/desktop/Kage.
Send it to the victim. When the victim clicks it, a session will start. Check out the session on the ‘Sessions‘ option.
Congrats! you have successfully compromised the victim’s system. Now you can remotely control his/her machine.
Now you can access the folders, Network Drives, access camera, record mic, processes, etc.
Conclusion
Haven't found the solution or are you having an unknown error? Join HackTalkForum.com to start a discussion or join a discussion on it. | ![]() |
Leave a Reply
View Comments