Basic Security Testing with Kali Linux Daniel W . Dieterle 2013 ==================================================== Kali IP: 192.168.10.9 WIN 7 IP: 192.168.10.10 WIN XP IP: 192.168.10.11 MS2 IP: 192.168.10.12 Basically, using Metasploit to attack a target system usually involves: 1. Picking an Exploit 2. Setting Exploit Options 3. Picking a Payload 4. Setting Payload Options 5. Running the Exploit 6. Connecting to the Remote System 7. Performing Post Exploitation Processes ## 1. Picking an Exploi msf > show exploits # To start the Database at a terminal prompt, type the following: service postgresql start service metasploit start msf >help search msf >search MS13-069 #search by name or buletin msf >search cve:2013-3660 #search for specific cve msf >search cve:2013 #to see all CVE for that year msf >search unreal #search for a particular program msf > info exploit/unix/irc/unreal_ircd_3281_backdoor ##to see an exploit for more info ## 2. Setting Exploit Options #But before we set our exploit options, we need to “use” it msf > use exploit/unix/irc/unreal_ircd_3281_backdoor LHOST = Local Host, or our Kali System RHOST = Remote Host, or our target System LPORT = Port we want to use on our Kali System RPORT = Port we want to attack on our target System msf exploit(unix/irc/unreal_ircd_3281_backdoor) >show options