So basically any other way than just port service exploitation or through mail ? I created my first payload now I noticed that I have no idea how people put them on other devices.
You've kinda touched on the whole field of red teaming and pen testing. A lot of offensive hacking focuses on getting to the target as opposed to making interesting payloads (though, if you're interested in that then look into malware analysis)
Anyway possible. Physical access, trojan in the email, SQL injection, MiTM a connection and tamper with it, redirect it, or if you're lucky login access information may be transferred in plain text and you can just grab that for access, phish people for access information. Numerous ways. Hackersploit* and others like him on YT can help give you ideas
That's a very broad question. There are many ways. If you have physical access it should be obvious, if you don't have physical access then it gets a lot more tricky. You could exploit some vulnerability in a target, however the weakest link in the chain is always the human element which is why social engineering (phishing) is the most successful way.
There are multiple ways, usually there is a service running on the target that allows uploading and running the payload.
So basically any other way than just port service exploitation or through mail ? I created my first payload now I noticed that I have no idea how people put them on other devices.
I think, with a phishing mail or accoding it to another exe/pdf file
You've kinda touched on the whole field of red teaming and pen testing. A lot of offensive hacking focuses on getting to the target as opposed to making interesting payloads (though, if you're interested in that then look into malware analysis)
Yes, how indeed. Stick around this sub and you might just see a few a few possibilities.
You could inject any media file with the payload.
And then hope the target runs a version of the player that is susceptible to it?
Anyway possible. Physical access, trojan in the email, SQL injection, MiTM a connection and tamper with it, redirect it, or if you're lucky login access information may be transferred in plain text and you can just grab that for access, phish people for access information. Numerous ways. Hackersploit* and others like him on YT can help give you ideas
You mean hackersploit?
If the victim has a windows 7 or XP running on its network, I think it would be a check mate
I find that socal engineering with a small amount of alcohol opens the door very quickly at that point I plant the seeds
The scariest way is a jdb
That's a very broad question. There are many ways. If you have physical access it should be obvious, if you don't have physical access then it gets a lot more tricky. You could exploit some vulnerability in a target, however the weakest link in the chain is always the human element which is why social engineering (phishing) is the most successful way.
You can send a payload by disguising it like a .jpg or .txt file and phishing the target. Even a .txt file could be a potential payload.
The easy way is that they just send it to you and you click on the link or open the attachment yourself.
They let you do it for them nowadays.
Dig up the dirt with a shovel, insert, cover with dirt. Poor water. Watch it load.