Metasploit i AbouttheTutorial Metasploit is one of the most powerful and widely used tools for penetration testing. In this tutorial, we will take you through the various concepts and techniques of Metasploit and explain how you can use them in a real-time environment. This tutorial is meant for instructional purpose only. Audience This tutorial is meant for beginners who would like to learn the basic-to-advanced concepts of Metasploit and how to use it in penetration testing to safeguard their systems and networks. Prerequisites Before proceeding with this tutorial, you should have a good grasp over all the fundamental concepts of a computer and how it operates in a networked environment. Copyright&Disclaimer  Copyright 2018 by Tutorials Point (I) Pvt. Ltd. All the content and graphics published in this e-book are the property of Tutorials Point (I) Pvt. Ltd. The user of this e-book is prohibited to reuse, retain, copy, distribute or republish any contents or a part of contents of this e-book in any manner without written consent of the publisher. We strive to update the contents of our website and tutorials as timely and as precisely as possible, however, the contents may contain inaccuracies or errors. Tutorials Point (I) Pvt. Ltd. provides no guarantee regarding the accuracy, timeliness or completeness of our website or its contents including this tutorial. If you discover any errors on our website or in this tutorial, please notify us at contact@tutorialspoint.com
Metasploit ii TableofContents About the Tutorial..................................................................................................................................i Audience ................................................................................................................................................i Prerequisites ..........................................................................................................................................i Copyright & Disclaimer...........................................................................................................................i Table of Contents ..................................................................................................................................ii 1. METASPLOIT – INTRODUCTION ....................................................................................... 1 2. METASPLOIT – ENVIRONMENT SETUP........................................................................... 2 Install Virtual Box ..................................................................................................................................2 Install Kali Linux.....................................................................................................................................6 3. METASPLOIT – BASIC COMMANDS .................................................................................. 9 4. METASPLOIT ─ ARMITAGE GUI ......................................................................................13 5. METASPLOIT – PRO CONSOLE.........................................................................................15 6. METASPLOIT – VULNERABLE TARGET.........................................................................17 7. METASPLOIT – DISCOVERY SCANS ................................................................................20 8. METASPLOIT – TASK CHAINS ..........................................................................................23 9. METASPLOIT – IMPORT DATA........................................................................................26 10. METASPLOIT – VULNERABILITY SCAN.........................................................................28 11. METASPLOIT – VULNERABILITY VALIDATION..........................................................30 12. METASPLOIT – EXPLOIT....................................................................................................35 13. METASPLOIT – PAYLOAD..................................................................................................39 14. METASPLOIT – CREDENTIAL ...........................................................................................42
Metasploit iii 15. METASPLOIT – BRUTE-FORCE ATTACKS.....................................................................45 16. METASPLOIT – PIVOTING.................................................................................................49 17. METASPLOIT – MAINTAINING ACCESS.........................................................................53 18. METASPLOIT – METAMODULES......................................................................................55 19. METASPLOIT – SOCIAL ENGINEERING..........................................................................61 20. METASPLOIT – EXPORT DATA........................................................................................67 21. METASPLOIT – REPORTS..................................................................................................71
Metasploit 1 Metasploit is one of the most powerful tools used for penetration testing. Most of its resources can be found at: https://www.metasploit.com. It comes in two versions: commercial and free edition. There are no major differences in the two versions, so in this tutorial, we will be mostly using the Community version (free) of Metasploit. As an Ethical Hacker, you will be using “Kali Distribution” which has the Metasploit community version embedded in it along with other ethical hacking tools. But if you want to install Metasploit as a separate tool, you can easily do so on systems that run on Linux, Windows, or Mac OS X. The hardware requirements to install Metasploit are:  2 GHz+ processor  1 GB RAM available  1 GB+ available disk space Matasploit can be used either with command prompt or with Web UI. The recommended OS versions for Metasploit are:  Kali Linux 2.0 or Upper Versions  Backtrack 3 and Upper Versions  Red Hat Enterprise Linux Server 5.10+  Red Hat Enterprise Linux Server 6.5+  Red Hat Enterprise Linux Server 7.1+  Ubuntu Linux 10.04 LTS  Ubuntu Linux 12.04 LTS  Ubuntu Linux 14.04 LTS  Windows Server 2008 R2  Windows Server 2012 R2  Windows 7  Windows 8.1 1. Metasploit – Introduction
Metasploit 2 We will take the following actions to set up our test environment:  We will download Virtual box and install it.  Download and install Kali distribution.  Download and install Metasploitable which will be our hacking machine.  Download and install Windows XP which will be another hacking machine. In total, we will have 3 machines which will be logically connected in the same network. InstallVirtualBox To download Virtual Box, go to https://www.virtualbox.org/wiki/Downloads Select the appropriate version depending on your OS and the hardware configuration of your system. 2. Metasploit – Environment Setup
Metasploit 3 After selecting the appropriate version of Virtual Box, the following screen will appear. Click Next.
Metasploit 4 On the next screen, set the location where you want to install the application. You will get a Warning message before proceeding with the installation.
Metasploit 5 Click Yes on the above screen which will display the following screen. Click Install to begin the installation. Once the installation is complete, you will get the following screen. Click Finish to exit the Setup Wizard.
Metasploit 6 Now, you will be greeted with the opening screen of VirtualBox. Now we are ready to install the rest of the hosts for this tutorial. InstallKaliLinux You can download Kali Linux from its official website: https://www.kali.org/downloads/
Metasploit 7 Go to the official website and download prebuilt Kali Linux VirtualBox images. Next, open VirtualBox Manager and go to Machine -> New. Go to the location where Kali Linux has been downloaded and choose a virtual hard disk file.
Metasploit 8 The next screen will prompt you to create a virtual machine. Click the Create button, as shown in the following screenshot. Now, you can start Kali OS. Your default username will be root and your password will be toor.
Metasploit 9 In this chapter, we will discuss some basic commands that are frequently used in Metasploit. First of all, open the Metasploit console in Kali. You can do so by following the path: Applications -> Exploitation Tools -> Metasploit. 3. Metasploit – Basic Commands
Metasploit 10 Once you open the Metasploit console, you will get to see the following screen. Highlighted in red underline is the version of Metasploit. Help Command If you type the help command on the console, it will show you a list of core commands in Metasploit along with their description.
Metasploit 11 End of ebook preview If you liked what you saw… Buy it from our store @ https://store.tutorialspoint.com

Metasploit tutorial

  • 2.
    Metasploit i AbouttheTutorial Metasploit is oneof the most powerful and widely used tools for penetration testing. In this tutorial, we will take you through the various concepts and techniques of Metasploit and explain how you can use them in a real-time environment. This tutorial is meant for instructional purpose only. Audience This tutorial is meant for beginners who would like to learn the basic-to-advanced concepts of Metasploit and how to use it in penetration testing to safeguard their systems and networks. Prerequisites Before proceeding with this tutorial, you should have a good grasp over all the fundamental concepts of a computer and how it operates in a networked environment. Copyright&Disclaimer  Copyright 2018 by Tutorials Point (I) Pvt. Ltd. All the content and graphics published in this e-book are the property of Tutorials Point (I) Pvt. Ltd. The user of this e-book is prohibited to reuse, retain, copy, distribute or republish any contents or a part of contents of this e-book in any manner without written consent of the publisher. We strive to update the contents of our website and tutorials as timely and as precisely as possible, however, the contents may contain inaccuracies or errors. Tutorials Point (I) Pvt. Ltd. provides no guarantee regarding the accuracy, timeliness or completeness of our website or its contents including this tutorial. If you discover any errors on our website or in this tutorial, please notify us at contact@tutorialspoint.com
  • 3.
    Metasploit ii TableofContents About the Tutorial..................................................................................................................................i Audience................................................................................................................................................i Prerequisites ..........................................................................................................................................i Copyright & Disclaimer...........................................................................................................................i Table of Contents ..................................................................................................................................ii 1. METASPLOIT – INTRODUCTION ....................................................................................... 1 2. METASPLOIT – ENVIRONMENT SETUP........................................................................... 2 Install Virtual Box ..................................................................................................................................2 Install Kali Linux.....................................................................................................................................6 3. METASPLOIT – BASIC COMMANDS .................................................................................. 9 4. METASPLOIT ─ ARMITAGE GUI ......................................................................................13 5. METASPLOIT – PRO CONSOLE.........................................................................................15 6. METASPLOIT – VULNERABLE TARGET.........................................................................17 7. METASPLOIT – DISCOVERY SCANS ................................................................................20 8. METASPLOIT – TASK CHAINS ..........................................................................................23 9. METASPLOIT – IMPORT DATA........................................................................................26 10. METASPLOIT – VULNERABILITY SCAN.........................................................................28 11. METASPLOIT – VULNERABILITY VALIDATION..........................................................30 12. METASPLOIT – EXPLOIT....................................................................................................35 13. METASPLOIT – PAYLOAD..................................................................................................39 14. METASPLOIT – CREDENTIAL ...........................................................................................42
  • 4.
    Metasploit iii 15. METASPLOIT –BRUTE-FORCE ATTACKS.....................................................................45 16. METASPLOIT – PIVOTING.................................................................................................49 17. METASPLOIT – MAINTAINING ACCESS.........................................................................53 18. METASPLOIT – METAMODULES......................................................................................55 19. METASPLOIT – SOCIAL ENGINEERING..........................................................................61 20. METASPLOIT – EXPORT DATA........................................................................................67 21. METASPLOIT – REPORTS..................................................................................................71
  • 5.
    Metasploit 1 Metasploit is oneof the most powerful tools used for penetration testing. Most of its resources can be found at: https://www.metasploit.com. It comes in two versions: commercial and free edition. There are no major differences in the two versions, so in this tutorial, we will be mostly using the Community version (free) of Metasploit. As an Ethical Hacker, you will be using “Kali Distribution” which has the Metasploit community version embedded in it along with other ethical hacking tools. But if you want to install Metasploit as a separate tool, you can easily do so on systems that run on Linux, Windows, or Mac OS X. The hardware requirements to install Metasploit are:  2 GHz+ processor  1 GB RAM available  1 GB+ available disk space Matasploit can be used either with command prompt or with Web UI. The recommended OS versions for Metasploit are:  Kali Linux 2.0 or Upper Versions  Backtrack 3 and Upper Versions  Red Hat Enterprise Linux Server 5.10+  Red Hat Enterprise Linux Server 6.5+  Red Hat Enterprise Linux Server 7.1+  Ubuntu Linux 10.04 LTS  Ubuntu Linux 12.04 LTS  Ubuntu Linux 14.04 LTS  Windows Server 2008 R2  Windows Server 2012 R2  Windows 7  Windows 8.1 1. Metasploit – Introduction
  • 6.
    Metasploit 2 We will takethe following actions to set up our test environment:  We will download Virtual box and install it.  Download and install Kali distribution.  Download and install Metasploitable which will be our hacking machine.  Download and install Windows XP which will be another hacking machine. In total, we will have 3 machines which will be logically connected in the same network. InstallVirtualBox To download Virtual Box, go to https://www.virtualbox.org/wiki/Downloads Select the appropriate version depending on your OS and the hardware configuration of your system. 2. Metasploit – Environment Setup
  • 7.
    Metasploit 3 After selecting theappropriate version of Virtual Box, the following screen will appear. Click Next.
  • 8.
    Metasploit 4 On the nextscreen, set the location where you want to install the application. You will get a Warning message before proceeding with the installation.
  • 9.
    Metasploit 5 Click Yes onthe above screen which will display the following screen. Click Install to begin the installation. Once the installation is complete, you will get the following screen. Click Finish to exit the Setup Wizard.
  • 10.
    Metasploit 6 Now, you willbe greeted with the opening screen of VirtualBox. Now we are ready to install the rest of the hosts for this tutorial. InstallKaliLinux You can download Kali Linux from its official website: https://www.kali.org/downloads/
  • 11.
    Metasploit 7 Go to theofficial website and download prebuilt Kali Linux VirtualBox images. Next, open VirtualBox Manager and go to Machine -> New. Go to the location where Kali Linux has been downloaded and choose a virtual hard disk file.
  • 12.
    Metasploit 8 The next screenwill prompt you to create a virtual machine. Click the Create button, as shown in the following screenshot. Now, you can start Kali OS. Your default username will be root and your password will be toor.
  • 13.
    Metasploit 9 In this chapter,we will discuss some basic commands that are frequently used in Metasploit. First of all, open the Metasploit console in Kali. You can do so by following the path: Applications -> Exploitation Tools -> Metasploit. 3. Metasploit – Basic Commands
  • 14.
    Metasploit 10 Once you openthe Metasploit console, you will get to see the following screen. Highlighted in red underline is the version of Metasploit. Help Command If you type the help command on the console, it will show you a list of core commands in Metasploit along with their description.
  • 15.
    Metasploit 11 End of ebookpreview If you liked what you saw… Buy it from our store @ https://store.tutorialspoint.com