[Chapter and Program Directory]
Introduction
condition:
The core of Metasploit
Basic configuration
Metasploit module
Metasploit is a powerful penetration testing platform, which includes many penetration testing tools. This article briefly introduces the configuration and basic usage of Metasploit, mainly including the following aspects:
The core of Metasploit
Basic configuration
Metasploit module
Metasploit's utility
Introduction
Metasploit is a free, open source penetration testing platform that can be used to test different systems and frameworks for penetration, or it can be regarded as a separate penetration testing system. This article will briefly introduce the basic usage of Metasploit, as well as how to add exp to Metasploit, how to exploit vulnerabilities, etc.
condition:
Various instances of Metasploit in this article require the following conditions to support:
BackTrack5
Metasploit module
Network connection
Ruby environment
Windows/linux system
The core of Metasploit
Metasploit's framework is a unified vulnerable database with easy-to-update mechanism. Because it is open source in nature, it can be easily manipulated to meet the needs, such as writing your own code to exploit vulnerabilities, and possibly deploying newly compiled exp to an existing Metasploit database.
The framework is developed in the Ruby language and includes scripts written by Perl, C, assembly, and various Python components. It's basically designed for Linux's operating systems, so its command structure has a very similar command shell to the Linux command shell, but now it supports all mainstream operating systems like Windows, Solaris, and Mac. It has a consistent interface for configuring options and performing attacks and isolating exp from payload. Metasploit uses the following terms to perform a specific type of attack:
Exploit
Exploit manipulates malicious code for specific vulnerabilities in computer systems. Metasploi provides Exploit across multiple operating systems and applications, providing multiple ways to break through a single computer. Nessus can be used to scan vulnerabilities with Nmap and exploit them using Metasploit. After identifying a specific vulnerability but not finding exploits in the Metasploit database, you can download the exploit by visiting exploit-db.com. Compiling knows that it can be ported to the Metasploit database as an Exploit
Payloads
Before exploiting a vulnerability, you must first establish a payload. Its function is to determine what operations to perform after the vulnerability attack is successful. Payload is basically a reverse shell used to access a remote computer and to implant a backdoor through the shell to wait until the hacked computer.
Encoders
It is not possible to ensure that all exp in Metasploit can work normally. Sometimes you will encounter firewalls, ipS, IDC, etc. All attempts to attack may be filtered out by the firewall. At this time, you need to use Encoders to encode exp, etc. To escape firewall, IPS, and IDS detection.
Options
All Exploit and Payload have some built-in parameters, such as remote IP, local IP, LPORT, RPORT, service path, username, etc. These parameters need to be configured before utilizing exp. You can use the Show Options command to display specific options.
Basic configuration
Metasploit can be installed independently on Windows or Linux systems, or directly using the built-in Metasploit in BackTrack5. It is recommended to use Metasploit in BackTrack5. It is necessary to use it before use. In order to ensure the smooth progress of the usage process, the following configuration is required:
Update BackTrack5
It is recommended to update BackTrack5 before using it to get the newly added Exploit or tools, etc. The update command is as follows:
#sudo apt-get update
Start the network service
After logging in to BackTrack5, the IP address is usually not automatically assigned, and you need to start or stop the network service with the following command:
?