• 26,952
  • +1,026
  • 3,065
5 Steps to Screen Capture Victim Screen Using Metasploit Meterpreter

5 Steps to Screen Capture Victim Screen Using Metasploit Meterpreter

Bookmark

Type : Tips and Trick

Level : Easy

Platform : Windows (Any)

When you already successfully compromising a vulnerable computer, sometimes you need to know what they are doing in their screen. By using meterpreter payload, you can do capturing user screen and it will be saved in your local machine. To doing this tips, you need to perform an attack first using your metasploit framework. You can view a few of my previous tutorial below :

Mozilla Firefox 3.5 – 3.6 nsTreeRange Vulnerability

Creating EXE Backdoor using Metasploit in 4 steps

and so on…. you can view the tutorial here.

Requirement :

1. Metasploit Framework

2. Operating System (Windows or Linux) to make Metasploit Framework run on your platform. It is better use Linux.

5 Steps to Screen Capture Victim Screen Using Metasploit Meterpreter:

1. Let say we already on Meterpreter console(I use my tutorial to exploit Mozilla nsTreeRange Vulnerability). Run ps command to view all active process.

screen capture victim screen using metasploit meterpreter

2. Find Process ID for Explorer.exe. Here in my example, victim Explorer.exe process ID was 1804 and then try to migrate to Explorer.exe process.

screen capture victim screen using metasploit meterpreter

3. After successfully migrate to Explorer.exe process, we need to load and use meterpreter extension "espia" to enable capture on victim screen.

screen capture victim screen using metasploit meterpreter

4. Run screengrab to start capturing victim screenshot, the image will be saved on your local drive.(I  use Backtrack 5, it will saved on Desktop).

screen capture victim screen using metasploit meterpreter

5. Here is the example screenshot on my victim computer. I think this guy wanna preparing to cook salmon fish…LoL

screen capture victim screen using metasploit meterpreter

Hope you enjoy it ๐Ÿ™‚

Share this article if you found this post was useful:

Blogger at hacking-tutorial.com. Love PHP, offensive security and web. Contact him at me[-at-]vishnuvalentino.com

See all posts by || Visit Website : http://www.vishnuvalentino.com

  • jouj

    this tutorial is also in LAN connection ???
    i ask so many questions because it look the best website to get answers and to learn from it

    • v4L

      #jouj
      yes the example above I’m doing in LAN…

  • Jay

    "I think this guy wanna preparing salmon fish"  = another useless LAN tutorial fail, with poor grammar.

    • v4L

      #Jay
      LoL…I’m not American or UK(it’s not my mother tongue), sorry for my bad grammar…maybe people from iowa(I’m sure english was your mother tongue) like you can teach me how to speak and wrote english much better… ๐Ÿ™‚

  • Jay

    Maybe you are right. I do apologize for coming off as just another rude American. We could possibly compare notes someday and work on many things together as a team. Not just grammar but also more tutorials involving things besides just LAN. Do accept my apology.

    • v4L

      #Jay
      It’s ok jason, sometimes people can do wrong things. ๐Ÿ™‚

  • Jay

    Maybe if you want a proof reader in your future tutorials I can be nice and offer my help. Instead of being mean about bad grammar helping is a better way to approach it. Also do you plan to do more in depth WAN tutorials besides this one below? Message me if you would like to talk more about it.

    http://www./hacking-tutorial/how-to-do-hacking-the-internet-wan-not-lan-using-metasploit-the-logic/.

    • v4L

      #Jay
      Thanks for your help it will be nice, you can give me some advice in comment which one I mistype the grammar or wrong information, so I can fix it soon ๐Ÿ™‚ as the other readers do to my other tutorials they wrote comment as an information for me to fix it.