Metasploit Review Lab

Metasploit Review Lab

TOPICS:

Getting Familiar with Metasploit

Vulnerability Scanning with WMAP

Configuring Exploits and Payloads


Getting Familiar with Metasploit:

Run the msfdb init command to initialize the Metasploit database

Run the service postgresql start command start the Postgres database server

Run the msfconsole command to launch the msfconsole

Once the console is launched, run the help command to learn about the basic Metasploit commands

Terminal commands like ifconfig can be used inside of the msfconsole

Run the connect command to use netcat within msfconsole to connect to services, and press CTRL-C to break the connection

  • Syntax: connect [IP address] [port]

Run the show all command to see all of the modules available in Metasploit

Run the show exploits command to see all of the exploits and payloads available in Metasploit

Run the show payloads command to see all of the payloads available in Metasploit


Vulnerability Scanning with WMAP:

WMAP is a web app vulnerability scanner in Metasploit

Run the load wmap command to load WMAP

Run the wmap_sites -h command to see options for managing the sites we want scan

Adding a site to scan

  • Syntax: wmap_sites -a https://[IP address]

Run the wmap_sites -l command to confirm added sites

Run the wmap_targets -t command to select an available site as the target for the mutillidae module

  • Syntax: wmap_sites -t https://[IP address]/mutillidae/index.php

Run the wmap_targets -l command to confirm added target site

Run the wmap_run -h command to see options for scanning the target site

Run the wmap_run -t command to see all the modules available to use against the target

Run the cat /root/profile command to see the profile that will be used in the WMAP scan

Use the wmap_run -e /root/profile command to run the scanner using the profile

Run the wmap_vulns -l command to list the vulnerabilities found during the scan


Configuring Exploits and Payloads

Use the search command to find exploits for a target software

Run the info command to learn how to use the specified exploit

  • Syntax: info exploit/path/to/the_exploit

Run the use command to load up the exploit

  • Syntax: use exploit/path/to/the_exploit

Run the show options command once the exploit is loaded to view and set up the available options

Run the set RHOST command to set the target for the exploit

  • Syntax: set RHOST [IP address]

Run the set payload command to choose the payload that will be delivered to the target server once the exploit is successful

  • Syntax: set payload path/to/the_payload

Once the payload is selected, the show options command will include the payload options

Run the set LHOST command to set the listener for the attack machine

  • Syntax: set LHOST [IP address]

Once all the exploit options are set, run the exploit command to initiate the exploit


Resources:

Metasploit For Beginners - #1 - The Basics - Modules, Exploits & Payloads:

Use Metasploit's WMAP Module to Scan Web Applications for Common Vulnerabilities:

Chukwuemeka Awah

Information Security || Incident Response || PURPLE TEAM || Cyber-security || Cloud Security || Application Security || CSA || SOC || ISO 27001 || AZURE || AWS || DEVSECOP ||

1 年

Great one ! Hoping to check it out, any pointers?

回复
Stephan R.

Cybersecurity & Education Specialist

1 年

Why, praytell, are you starting up database servers when you messed around with Metasploit? Probably some next level stuff I’m unfamiliar with. I’m curious ??

Jon Good ??

Cloud Security & Compliance Leader | CEO @ Cyber Training Pro | YouTuber, Trainer, Career Coach, Mentor ?? | Developing Information Security Beginners Into Experts

1 年

Awesome stuff Octavious! I encourage you to try and find a manual exploit of the vulnerability so you are also comfortable not having a tool at your disposal. Although we might not always go that far, it's likely to be a fun challenge to test your research skills!

要查看或添加评论,请登录

Octavious W.的更多文章

  • Internet Browser Forensics with Autopsy

    Internet Browser Forensics with Autopsy

    In this lab we learned how to access web browser history from Windows computers and how to use that data in an…

  • SQL Injection Lab

    SQL Injection Lab

    TOPICS: Basic SQL Commands Querying a database with SQL Deleting data with SQL SQL Injection Techniques Basic SQL…

  • Web Hacking Lab

    Web Hacking Lab

    TOPICS Web Application Vulnerability Scanning With Nikto Burp Suite setup Using Burp Suite to build a site map Brute…

    3 条评论
  • System Hardening

    System Hardening

    System hardening is the process of making changes to a system or application to make it more secure than it’s default…

    2 条评论
  • I went to Bsides Atlanta!

    I went to Bsides Atlanta!

    I had an amazing experience at BSides Atlanta 2023! Here are my highlights and takeaways of the day! My morning started…

    5 条评论
  • Reconnaissance

    Reconnaissance

    What is Reconnaissance? Reconnaissance is the process hackers use to gather as much information as possible about their…

    7 条评论
  • Logging for Cyber Security

    Logging for Cyber Security

    Here are some notes I took on Logging during my Security+ exam prep. Logs form detailed lists of activities related to…

    6 条评论
  • TryHackMe - New Hire Old Artifacts - Notes

    TryHackMe - New Hire Old Artifacts - Notes

    Scenario Notes: Widget LLC has some concerns with the endpoints in the Finance Dept. Especially an endpoint for a…

  • TryHackMe KAPE Hands-on Challenge

    TryHackMe KAPE Hands-on Challenge

    We will use the forensics tool KAPE to collect and process files from a device Scenario Notes: Organization X’s…

    1 条评论
  • TryHackMe - Windows Forensics 1 - Hands-on Challenge

    TryHackMe - Windows Forensics 1 - Hands-on Challenge

    We will identify where the different files for the relevant registry hives are located and load them into Registry…

    2 条评论

社区洞察

其他会员也浏览了