Channel: TechChip
Category: Howto & Style
Tags: shell hidden bindkalikali linux metasploitcyber securitykali linux tutorialmsfconsoleethical hacking tutorialsmetasploit tutorialshackinghackermetasploitmsfvenomkali linux hackingpenetration testingreverse shellethical hacking
Description: Watch advance video tutorials- please visit : techchip.net In this video I will be showing that how can hackers take control your PC using shell hidden bind tcp? How shell hidden bind tcp payload works? Video Chapters 0:00 ▶️ Introduction 0:21 ▶️ Disclaimer 0:38 ▶️ Why need hidden bind shell? 1:00 ▶️ Payload generate 2:45 ▶️ Payload deployment 4:51 ▶️ Ducky Script 5:44 ▶️ Run payload by USB rubber ducky 6:33 ▶️ Scan target system 7:24 ▶️ Reverse shell 8:01 ▶️ Control target PC 8:52 ▶️ ??? ▀▄▀▄▀▄ [ Follow Me on ] ▄▀▄▀▄▀ Twitter: twitter.com/techchipnet Facebook: facebook.com/techchip website: techchip.net YouTube: youtube.com/techchipnet Instagram: instagram.com/techchipnet DISCLAIMER: This video is for strictly educational and informational purpose only. I own all equipment used for this demonstration. Hacking without permission is illegal so please keep in mind thanks.