Hacking and Cyber Security Tutorials, Learn How To Hack, Linux Tutorials, Programming Tutorials, Android & iOS Hacking
Hack Like a Pro: Metasploit for the Aspiring Hacker, Part 1 (Primer & Overview)
Hey there my tenderfoot hackers,
With this guide, I'm starting a sequential and cumulative series
for learning and using Metasploit. This first part will cover the very
basics of Metasploit for those of you who are new to Null Byte, and as a
refresher for those of you who are not. With that in mind, this will be
quick and dirty first lesson on using one of the most powerful hacking
platforms on planet Earth.
Metasploit Background & Installation
Metasploit
was developed by HD Moore as an open source project in 2003. Originally
written in Perl, Metasploit was completely rewritten in Ruby in 2007.
In 2009, it was purchased by Rapid7, an IT security company that also
produces the vulnerability scanner Nexpose.
Metasploit is now in version 4.9.3, which is included in our Kali Linux. It's also built into BackTrack. For those of you using some other version of Linux or Unix (including Mac OS), you can download Metasploit from Rapid7's website.
For
those of you using Windows, you can also grab it from Rapid7, but I do
not recommend running Metasploit in Windows. Although you can download
and install it, some of the capabilities of this hacking framework do
not translate over to the Windows operating system, and many of my hacks
here on Null Byte will not work on the Windows platform.
Metasploit
now has multiple products, including Metasploit Pro (the full
commercial version) and the Community edition that is built into Kali
and remains free. We will focus all of our efforts on the Community
edition, as I am well aware that most of you will not be buying the
$30,000 Pro edition.
Ways to Use Metasploit
Metasploit can be accessed or used in multiple ways. The most common method, and the one I use, is the interactive Metasploit console. This is the one that is activated by typing msfconsole at the command line in Kali. There are several other methods as well.
Msfcli
First, you can use Metasploit from the command line, or in msfcli
mode. Although it appears that when we are in the console that we are
using the command line, we are actually using an interactive console
with special keywords and commands. From the msfcli, we ARE actually
using a Linux command line.
We can get the help screen for msfcli by typing: kali > msfcli -h
Now to execute an exploit from the msfcli, the syntax is simply: kali > msfcli <the exploit> payload = <the payload> rhost = <IP> lhost = <IP> E
Where E is short for execute.
In my tutorial on creating payloads to evade AV software, we are using the msfencode and msfpayload command in the command line (msfcli) mode.
The
drawback to using the msfcli is that it is not as well-supported as the
msfconsole, and you are limited to a single shell, making some of the
more complex exploits impossible.
Armitage
If you want to use
Metasploit with a GUI (graphical user interface), at least a couple of
options are available. First, Raphael Mudge has developed the Armitage
(presumably a reference to a primary character in the seminal
cyberhacking science fiction work, Neuromancer—a must read for any hacker with a taste for science fiction).
To start Armitage in Kali, simply type: kali > armitage
If Armitage fails to connect, try these alternative commands: kali > service start postgresql kali > service start metasploit kali > service stop metasploit
Armitage
is a GUI overlay on Metasploit that operates in a client/server
architecture. You start Metasploit as a server and Armitage becomes the
client, thereby giving you full access to Metasploit's features through a
full featured—thought not completely intuitive—GUI. If you really need a
GUI to feel comfortable, I don't want to discourage you from using
Armitage, but mastering the command line is a necessity for any
self-respecting hacker.
Modules
Metasploit has six different types of modules. These are:
payloads
exploits
post
nops
auxiliary
encoders
Payloads are the code that we will leave behind on the hacked system. Some people call these listeners, rootkits, etc. In Metasploit, they are referred to as payloads. These payloads include command shells, Meterpreter,
etc. The payloads can be staged, inline, NoNX (bypasses the No execute
feature in some modern CPUs), PassiveX (bypasses restricted outbound
firewall rules), and IPv6, among others. Exploits
are the shellcode that takes advantage of a vulnerability or flaw in
the system. These are operating system specific and many times, service
pack (SP) specific, service specific, port specific, and even
application specific. They are classified by operating system, so a
Windows exploit will not work in a Linux operating system and vice
versa. Post are modules that we can use post exploitation of the system. Nops are short for No OPerationS.
In x86 CPUs, it is usually indicated by the hex 0x90. It simply means
"do nothing". This can be crucial in creating a buffer overflow. We can
view the nops modules by using the show command. msf > show nops
Auxiliary includes numerous modules (695) that don't fit into any of the other
categories. These include such things are fuzzers, scanners, denial of
service attacks, and more. Encoders are modules that enable us to encode our payloads in various ways to get past AV an other security devices. We can see the encoders by typing: msf > show encoders
As you can see, there are numerous encoders built into Metasploit. Once of my favorites is shikata_ga_nai, which allows us to to XOR the payload to help in making it undetectable by AV software and security devices.
Searching
Ever since Metasploit 4 was released, Metasploit has added search capabilities. Previously, you had to use the msfcli and grep
to find the modules you were looking, but now Rapid7 has added the
search keyword and features. The addition of the search capability was
timely as Metasploit has grown dramatically, and simple eyeball searches
and grep searches were inadequate to search over 1,400 exploits, for
instance.
The search keyword enables us to do simple keyword
searches, but it also allows us to be a bit more refined in our search
as well. For instance, we can define what type of module we are
searching for by using the type keyword. msf > search type:exploit
When we do so, Metasploit comes back with all 1,295 exploits. Not real useful.
If
we know we want to attack a Sun Microsystems machine running Solaris
(Sun's UNIX), we may want may to refine our search to only solaris
exploits, we can then use platform keyword. msf > search type:exploit platform:solaris
Now we have narrowed our search down to only those exploits that will work against a Solaris operating system.
To
further refine our search, let's assume we want to attack the Solaris
RPC (sunrpc) and we want to see only those exploits attacking that
particular service. We can add the keyword "sunrpc" to our serach like
below: msf > search type:exploit platform:solaris sunrpc
As you can see, this narrows are results down to just five exploit modules!
Metasploit has many capabilities that are still untapped by us, so I will continue this Metasploit series to explore the simplest to the most complex.
New Jersey - The Star Casino Resort The Star Casino Resort in Atlantic City is set to become 부천 출장안마 the new New Jersey's Star Casino Resort 문경 출장샵 and Hotel are scheduled to open in the Jan 대전광역 출장마사지 15, 2022The Star 룰렛 전략 Casino Resort - Hotels - 안양 출장안마 JW Marriott
New Jersey - The Star Casino Resort
ReplyDeleteThe Star Casino Resort in Atlantic City is set to become 부천 출장안마 the new New Jersey's Star Casino Resort 문경 출장샵 and Hotel are scheduled to open in the Jan 대전광역 출장마사지 15, 2022The Star 룰렛 전략 Casino Resort - Hotels - 안양 출장안마 JW Marriott