BEWARE: This is a legacy static copy!
This is an old old old archive. Please don't trust any information you find on this wiki. Looking for up-to-date information? Go to hsbxl.be or join our Matrix channel.
			
						This is an old old old archive. Please don't trust any information you find on this wiki. Looking for up-to-date information? Go to hsbxl.be or join our Matrix channel.
Metasploit introduction
From Hackerspace Brussels
								
												
				
  | 
What is Metasploit? How does it work? Just the first baby steps. Let's figure out more together...
The Metasploit Project is a computer security project that provides information about security vulnerabilities and aids in penetration testing.
More info on the project site: https://www.metasploit.com
Some introductory videos and other resources[edit]
Please have a look at them so we can speed up to the fun part...
- https://www.youtube.com/watch?v=8lR27r8Y_ik
 - https://www.youtube.com/watch?v=6SNHuWaLuhU
 - https://www.youtube.com/watch?v=CYB6Uta9VTI
 - https://www.youtube.com/watch?v=AyMgYhwyGSE
 
- Msf venom: https://netsec.ws/?p=331
 - Metasploit tutorials: https://www.hackers-arise.com/metasploit-1
 
What you need to do[edit]
An environment with a few typical vulnerable devices (metasploitable, ...) will be available to go at it. Bring a laptop with WiFi and metasploit installed. You could also just run from a virtual machine or live CD with Kali Linux or Parrot OS.
- Kali Linux: https://www.kali.org/
 - Parrot OS: https://www.parrotsec.org/
 
Slide Deck[edit]
About Metasploit[edit]
- Product by Rapid7 – also has a pro (paid) version
 -  Other tools
- Metasploitable 2 & 3
 - A few freebies
 - Lots of paid tools
 
 - Course: https://www.offensive-security.com/metasploit-unleashed/
 - Website: https://www.rapid7.com/products/metasploit/
 - Part of Kali Linux: https://kali.org & https://kali.training
 
6 types of modules[edit]
- Exploits: take advantage of a system vulnerability
 - Payloads: plant this on the system to get access
 - Auxiliary: discovery tools (crawl, scan, snif) etc...
 - Nops: “nop = do nothing” – to allow remote execution
 - Post: post-exploitation tools (escalation, capture, ...)
 - Encoders: evasion, bypassing firewall, etc...
 
Basic commands in Metasploit[edit]
- Help = overview of all commands
 - use: load a module → visible in command line
 - search: search a module
 - set and setg (set globally)
 - back
 - exit
 
!! Autocomplete :D (tab)
Most important commands in a module[edit]
- show info
 - show options
 - show payloads
 - show targets
 - set and setg
 - run (=exploit)
 
Searching in metasploit[edit]
- Parameters
 - Platform
 - Type
 - Ranking (-R) https://github.com/rapid7/metasploit-framework/wiki/Exploit-Ranking
 - Search platform:windows type:windows flash
 
First steps when looking into a network[edit]
- IP-range
 - Open ports
 
- TOOL: nmap
 - Metasploit: db_nmap
 
Modular Layout[edit]
You can easily add modules to MetaSploit. You can find these on Github or on Exploit-db.
Practical tips[edit]
- Go to /usr/share/metasploit-framework/modules and keep this over for a practical overview of available modules
 - ...