User Tools

Site Tools


dardan:cyberacademy:metasploit
Basic Security Testing with Kali Linux
Daniel W . Dieterle
2013
====================================================
Kali IP: 192.168.10.9
WIN 7 IP: 192.168.10.10
WIN XP IP: 192.168.10.11
MS2 IP: 192.168.10.12


Basically, using Metasploit to attack a target system usually involves: 
1. Picking an Exploit 
2. Setting Exploit Options 
3. Picking a Payload 
4. Setting Payload Options 
5. Running the Exploit 
6. Connecting to the Remote System 
7. Performing Post Exploitation Processes 

## 1. Picking an Exploi
msf > show exploits 
# To start the Database at a terminal prompt, type the following: 
 service postgresql start 
 service metasploit start 

msf >help search
msf >search MS13-069      #search by name or buletin 
msf >search cve:2013-3660 #search for specific cve
msf >search cve:2013      #to see all CVE for that year
msf >search unreal        #search for a particular program
msf > info exploit/unix/irc/unreal_ircd_3281_backdoor ##to see an exploit for more info


## 2. Setting Exploit Options 
#But before we set our exploit options, we need to “use” it
msf > use exploit/unix/irc/unreal_ircd_3281_backdoor

LHOST = Local Host, or our Kali System 
RHOST = Remote Host, or our target System 
LPORT = Port we want to use on our Kali System 
RPORT = Port we want to attack on our target System

msf exploit(unix/irc/unreal_ircd_3281_backdoor) >show options
dardan/cyberacademy/metasploit.txt · Last modified: 2019/01/30 09:42 by dardan

Donate Powered by PHP Valid HTML5 Valid CSS Driven by DokuWiki