Visible to the public Security of operating system using the Metasploit framework by creating a backdoor from remote setup

TitleSecurity of operating system using the Metasploit framework by creating a backdoor from remote setup
Publication TypeConference Paper
Year of Publication2022
AuthorsThapa, Ria, Sehl, Bhavya, Gupta, Suryaansh, Goyal, Ankur
Conference Name2022 2nd International Conference on Advance Computing and Innovative Technologies in Engineering (ICACITE)
Keywordsbackdoor. Armitage, composability, DLL of meterpreter, exploit, injection, Linux, metasploit, Meterpreter, Metrics, Msfconsole, Network, Operating systems, pubcrawl, Resiliency, security, system security, Technological innovation, TLS, vulnerabilities, Windows 7, Windows Operating System Security
AbstractThe era of technology has seen many rising inventions and with that rise, comes the need to secure our systems. In this paper we have discussed how the old generation of people are falling behind at being updated in tandem with technology, and losing track of the knowledge required to process the same. In addition this factor leads to leakage of critical personal information. This paper throws light upon the steps taken in order to exploit the pre-existing operating system, Windows 7, Ultimate, using a ubiquitous framework used by everyone, i.e. Metasploit. It involves installation of a backdoor on the victim machine, from a remote setup, mostly Kali Linux operating machine. This backdoor allows the attackers to create executable files and deploy them in the windows system to gain access on the machine, remotely. After gaining access, manipulation of sensitive data becomes easy. Access to the admin rights of any system is a red alert because it means that some outsider has intense access to personal information of a human being and since data about someone explains a lot of things about them. It basically is exposing and human hate that. It depraves one of their personal identity. Therefore security is not something that should be taken lightly. It is supposed to be dealt with utmost care.
DOI10.1109/ICACITE53722.2022.9823460
Citation Keythapa_security_2022